Static task
static1
Behavioral task
behavioral1
Sample
c908d0f2ca5d2cd1044d7147ea58e4005b622b992bde610ee37242cf2ce63d7b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c908d0f2ca5d2cd1044d7147ea58e4005b622b992bde610ee37242cf2ce63d7b.exe
Resource
win10v2004-20220812-en
General
-
Target
c908d0f2ca5d2cd1044d7147ea58e4005b622b992bde610ee37242cf2ce63d7b
-
Size
299KB
-
MD5
e04ec59b7a280bb79e859ed158e302c5
-
SHA1
504730a29d345c22a2467dcbfc14259f5d98f4e6
-
SHA256
c908d0f2ca5d2cd1044d7147ea58e4005b622b992bde610ee37242cf2ce63d7b
-
SHA512
a2960f9c8f561552c27a7665b0efd50737e2deca6ca37a4d4041cce4978b8dc05b96d9895e828197cd5c963c14df58aabf6efad1029504191d554efe70ef5f89
-
SSDEEP
6144:kWsziJkmXP4A9K95gTY1PuyJSdVPZF16PyRgeR9zAaDxuYSurJv:vsekmXgAs5gTY1PunVxn6MTR9UMxu2lv
Malware Config
Signatures
Files
-
c908d0f2ca5d2cd1044d7147ea58e4005b622b992bde610ee37242cf2ce63d7b.exe windows x86
bd60a5103061f0a6b40214b4aa5ac5d9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalUnlock
GetSystemTime
GetComputerNameA
GetCommandLineW
CreateThread
PulseEvent
GetCurrentDirectoryA
CloseHandle
CreateThread
SetLastError
HeapCreate
Sleep
CreateFileA
LoadLibraryExA
GetModuleHandleA
lstrlenA
SetEvent
GetTickCount
LocalFree
UnmapViewOfFile
user32
GetDC
IsWindow
GetKeyState
SetFocus
GetDlgItem
CallWindowProcA
DrawMenuBar
DispatchMessageA
DrawEdge
CreateWindowExA
FillRect
GetScrollBarInfo
CheckRadioButton
clbcatq
DowngradeAPL
CheckMemoryGates
SetupOpen
UpdateFromAppChange
SetSetupSave
desk.cpl
InstallScreenSaver
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 628KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ