Static task
static1
Behavioral task
behavioral1
Sample
c484c4a3cc7b772da06e4ec1525e909cc50e40eede6f25d972b8664b47b55964.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c484c4a3cc7b772da06e4ec1525e909cc50e40eede6f25d972b8664b47b55964.exe
Resource
win10v2004-20220901-en
General
-
Target
c484c4a3cc7b772da06e4ec1525e909cc50e40eede6f25d972b8664b47b55964
-
Size
278KB
-
MD5
074ff48a7fd45f8ae34eeb0a54001c70
-
SHA1
78c977df3e8785c7bd6bba2a9d403fa133a1f325
-
SHA256
c484c4a3cc7b772da06e4ec1525e909cc50e40eede6f25d972b8664b47b55964
-
SHA512
f4256060f946ffd9824c06879c3bf36a6e69f7384ec23f0afac11210b81d2a6f56b88ef2a942cb628237980091e88eeb92505fa7c6bfea399c384bed9ee8a51d
-
SSDEEP
6144:9dkteVPVJCVNcop/KRx0vAONtj1ZcwfL6h:EcdJCncopiRuh1ZZ
Malware Config
Signatures
Files
-
c484c4a3cc7b772da06e4ec1525e909cc50e40eede6f25d972b8664b47b55964.exe windows x86
b5ad50121e57cace1c23fef866f0bdbb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
GetProcAddress
GetModuleHandleA
lstrlenA
lstrcmpiA
SetEvent
CloseHandle
CreateThread
CreateEventA
InterlockedIncrement
GetModuleFileNameA
GetModuleHandleW
IsDBCSLeadByte
FreeLibrary
DeleteCriticalSection
LoadResource
FindResourceA
LoadLibraryExA
Sleep
GetCurrentThreadId
GetCommandLineA
FlushFileBuffers
CreateFileA
ReadFile
WriteConsoleW
InitializeCriticalSection
RaiseException
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
InterlockedDecrement
GetVersionExA
CreateMutexA
WaitForSingleObject
SizeofResource
ReleaseMutex
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
SetFilePointer
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
LCMapStringA
LCMapStringW
HeapCreate
VirtualFree
HeapReAlloc
ExitProcess
WriteFile
GetStdHandle
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
user32
CharNextW
CharNextA
PostThreadMessageA
DispatchMessageA
GetMessageA
wsprintfA
advapi32
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegQueryInfoKeyA
ole32
CoRegisterClassObject
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
StringFromGUID2
CoUninitialize
CoInitialize
CoRevokeClassObject
oleaut32
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
SysStringByteLen
SysAllocStringByteLen
SysFreeString
VariantClear
Sections
.text Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 67KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zoxqqcm Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE