Static task
static1
Behavioral task
behavioral1
Sample
c55662d4e844e231458468c34744392113e5c3d738173cf4f962ef50959ae1e3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c55662d4e844e231458468c34744392113e5c3d738173cf4f962ef50959ae1e3.exe
Resource
win10v2004-20220812-en
General
-
Target
c55662d4e844e231458468c34744392113e5c3d738173cf4f962ef50959ae1e3
-
Size
75KB
-
MD5
a17719daef97f9a018e2a37f1e0f1090
-
SHA1
3e3bf328631eecae8c548c8bd5efb04f6e446572
-
SHA256
c55662d4e844e231458468c34744392113e5c3d738173cf4f962ef50959ae1e3
-
SHA512
62e44aafddbf0ddcf9a0d933af69ae9257e59ed07bc18a0b78c1b081bbd26638762148487cda80226f7d44ea6652f60631321d2243e9571f960c233bd8e96283
-
SSDEEP
1536:b0DZwYOwmfN5MBM+6DLt2LthHiNDeGaBoQ7k7XzN2AzK:baZRODfN5UM+6lgvHeeGaf7k7XB2A
Malware Config
Signatures
Files
-
c55662d4e844e231458468c34744392113e5c3d738173cf4f962ef50959ae1e3.exe windows x86
3eba27a98fcd98ce3e57738faba6ff78
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
atl
ord16
ord21
ord18
ord57
ord23
ord17
ord20
ord32
ord43
ord44
ord37
kernel32
CloseHandle
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
CreateThread
CreateEventW
SetEvent
Sleep
lstrcmpiW
GetCurrentThreadId
GetCommandLineW
HeapFree
GetProcessHeap
GetLastError
GetExitCodeProcess
CreateProcessW
GetSystemDirectoryW
LocalFree
FormatMessageW
FlushInstructionCache
GetCurrentProcess
HeapAlloc
GetModuleHandleA
GetStartupInfoW
GetVersionExA
ExitProcess
GetProcAddress
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
GetModuleFileNameW
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
LoadLibraryA
SetFilePointer
RtlUnwind
SetStdHandle
WideCharToMultiByte
FlushFileBuffers
user32
GetWindowTextW
LoadStringW
SetThreadDesktop
OpenDesktopW
GetThreadDesktop
SetProcessWindowStation
OpenWindowStationW
GetUserObjectInformationW
GetProcessWindowStation
SetForegroundWindow
EnumThreadWindows
PostMessageW
DefWindowProcW
UnregisterClassW
SetWindowLongW
GetDesktopWindow
RegisterClassW
LoadIconW
MessageBoxW
UpdateWindow
SetDlgItemTextW
ShowWindow
MsgWaitForMultipleObjects
PeekMessageW
TranslateMessage
GetMessageW
DispatchMessageW
CharNextW
CreateWindowExW
DestroyWindow
PostQuitMessage
PostThreadMessageW
ntmsapi
CancelNtmsLibraryRequest
CancelNtmsOperatorRequest
OpenNtmsSessionW
SatisfyNtmsOperatorRequest
CloseNtmsSession
shell32
Shell_NotifyIconW
ole32
CoInitializeSecurity
CoInitializeEx
CoSuspendClassObjects
CoResumeClassObjects
CoUninitialize
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 45KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
nvehuqn Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE