Static task
static1
Behavioral task
behavioral1
Sample
c142e085f21d183c8b166b9a9ac5c9ecaf7f972dd63b2168b99ad0215b298657.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c142e085f21d183c8b166b9a9ac5c9ecaf7f972dd63b2168b99ad0215b298657.exe
Resource
win10v2004-20220812-en
General
-
Target
c142e085f21d183c8b166b9a9ac5c9ecaf7f972dd63b2168b99ad0215b298657
-
Size
696KB
-
MD5
5b35ec3cf35828525ecfad587c47e0df
-
SHA1
3c922892f3350930f3ba23a833c24fecd6987c2d
-
SHA256
c142e085f21d183c8b166b9a9ac5c9ecaf7f972dd63b2168b99ad0215b298657
-
SHA512
e3402f998c5a4f15111269736041219779223a1c1286c8ee4f16b53cdea682d566d64d0fc60a8c90930e056d33b9c0c077cbfbf99fe4db6877a43186a7b4f149
-
SSDEEP
12288:ZXtNsuiNF05KMeSQgLWSIxUw2CYOV3mkpPFbro8GCWdMlJhim50OrdAMwQrv2UQH:ZdNsuiN0gfpXsk/4vdMliyzAPO/RU6s2
Malware Config
Signatures
Files
-
c142e085f21d183c8b166b9a9ac5c9ecaf7f972dd63b2168b99ad0215b298657.exe windows x86
c10380cffe747505ddd05a3ca6135175
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempPathA
GetWindowsDirectoryA
CloseHandle
WinExec
WritePrivateProfileStringA
SetFileAttributesA
GetFileAttributesA
CreateFileA
WriteFile
GetTempFileNameA
GetFileSize
FindClose
FindFirstFileA
GetExitCodeProcess
WaitForSingleObject
OpenProcess
GetEnvironmentVariableA
GetSystemDirectoryA
GetProcAddress
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
CreateDirectoryA
GetCurrentProcess
LocalFree
LocalAlloc
GetModuleFileNameA
GetShortPathNameW
GetModuleFileNameW
SetFilePointer
OutputDebugStringA
DeleteFileA
MoveFileA
ReadFile
MoveFileExA
CreateProcessA
FreeLibrary
GetLastError
GetShortPathNameA
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
GetVersionExA
EnterCriticalSection
GetCPInfo
HeapFree
HeapAlloc
InterlockedDecrement
InterlockedIncrement
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStrings
LeaveCriticalSection
RtlUnwind
LCMapStringA
LCMapStringW
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetCurrentThreadId
GetFileType
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
SetLastError
TlsGetValue
TlsSetValue
TlsAlloc
user32
SystemParametersInfoA
MessageBoxA
wsprintfA
ExitWindowsEx
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegFlushKey
RegCloseKey
RegSetValueExA
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ole32
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
LoadTypeLi
RegisterTypeLi
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 600KB - Virtual size: 712KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 320.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE