Static task
static1
Behavioral task
behavioral1
Sample
c246546fe570e16c8b2cd9743b2a64e3b8eda27cc128101ebb71f5e3c4b3161e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c246546fe570e16c8b2cd9743b2a64e3b8eda27cc128101ebb71f5e3c4b3161e.exe
Resource
win10v2004-20220812-en
General
-
Target
c246546fe570e16c8b2cd9743b2a64e3b8eda27cc128101ebb71f5e3c4b3161e
-
Size
268KB
-
MD5
05605882f3c86b7bc71ace6e31a1d680
-
SHA1
b4eb428dbc4fa57439c7d58d6862cf1951c34a71
-
SHA256
c246546fe570e16c8b2cd9743b2a64e3b8eda27cc128101ebb71f5e3c4b3161e
-
SHA512
dc6eb890b09cb83aa1340c12c8801a833f68a20c8969f723e7322f5cf34ef62140c4859e7349eac84c85b9bfe22dc2e0ee562871d1f1966613902f4750cfc4f0
-
SSDEEP
3072:cTVX4S6GnlvmQbCce1NmHX8B3uAg0FuwaRtirBXXqZZWek4D1:cTVRHlvmQbCB1I3O3uAO9WrBXXpQ
Malware Config
Signatures
Files
-
c246546fe570e16c8b2cd9743b2a64e3b8eda27cc128101ebb71f5e3c4b3161e.exe windows x86
854fb8198bc98fcfec31a95b8c082b57
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
lstrlenA
lstrcmpiA
SetEvent
CloseHandle
CreateThread
CreateEventA
InterlockedIncrement
GetModuleFileNameA
IsDBCSLeadByte
FreeLibrary
SizeofResource
DeleteCriticalSection
FindResourceA
LoadLibraryExA
GetModuleHandleA
Sleep
GetCurrentThreadId
GetCommandLineA
FlushFileBuffers
CreateFileA
ReadFile
InitializeCriticalSection
RaiseException
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
InterlockedDecrement
GetVersionExA
CreateMutexA
WaitForSingleObject
LoadResource
ReleaseMutex
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
LoadLibraryA
GetConsoleMode
GetConsoleCP
SetFilePointer
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
EnterCriticalSection
LeaveCriticalSection
LocalFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetProcAddress
GetSystemInfo
VirtualQuery
HeapReAlloc
GetProcessHeap
GetStartupInfoA
GetCPInfo
GetOEMCP
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
ExitProcess
WriteFile
GetStdHandle
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
user32
CharNextA
wsprintfA
PostThreadMessageA
DispatchMessageA
GetMessageA
UnregisterClassA
advapi32
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegQueryInfoKeyA
ole32
CoRegisterClassObject
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
StringFromGUID2
CoUninitialize
CoInitialize
CoRevokeClassObject
oleaut32
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
SysStringByteLen
SysAllocStringByteLen
SysFreeString
VariantClear
Sections
.text Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zotmsiw Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE