Static task
static1
Behavioral task
behavioral1
Sample
c19159bb6f2b0faba2ad7c96ebb35dd036ac77100b70cc980693420544a2d969.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c19159bb6f2b0faba2ad7c96ebb35dd036ac77100b70cc980693420544a2d969.exe
Resource
win10v2004-20221111-en
General
-
Target
c19159bb6f2b0faba2ad7c96ebb35dd036ac77100b70cc980693420544a2d969
-
Size
288KB
-
MD5
0a05c92d191cbd8509983955284d1ef3
-
SHA1
0cf538e6316f29ed6406ff9161eb5abb76a7bfe0
-
SHA256
c19159bb6f2b0faba2ad7c96ebb35dd036ac77100b70cc980693420544a2d969
-
SHA512
e894a2fc63f7f78e052a6cf0a514f7b8f95ba3ca2beb65e43955956fe50c491dc4abba483aab5fc54c86eb182d2d0a92c27007dcddcaa0aa8f33792bbe89360a
-
SSDEEP
6144:MRzLHxTuUwqkoiCHKZIsIc3vrRX9ewwwwq6EdwwwwwwEwe/wwwQw0rwwwPw9w/o8:MhkUwqUqgRg9
Malware Config
Signatures
Files
-
c19159bb6f2b0faba2ad7c96ebb35dd036ac77100b70cc980693420544a2d969.exe windows x86
7b9aee66f42c3e5b20f489d910278b80
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyA
RegCreateKeyExA
RegisterServiceCtrlHandlerA
GetLengthSid
CloseServiceHandle
RegSetValueExA
AllocateAndInitializeSid
comdlg32
GetOpenFileNameA
CommDlgExtendedError
PrintDlgA
mfc42
ord1576
ole32
CoRegisterClassObject
CoTaskMemAlloc
GetRunningObjectTable
GetClassFile
CLSIDFromProgID
StgIsStorageILockBytes
CoRevokeClassObject
CreateBindCtx
OleIsCurrentClipboard
StgOpenStorageOnILockBytes
CoGetClassObject
kernel32
HeapCreate
SetLastError
SetStdHandle
SetEnvironmentVariableA
ExitProcess
GetCurrentThreadId
CompareStringA
WriteFile
TlsFree
GetLocaleInfoA
SetFilePointer
InitializeCriticalSectionAndSpinCount
GetConsoleOutputCP
FatalAppExitA
CreateMutexA
IsValidCodePage
RtlUnwind
FreeLibrary
SetHandleCount
GetDateFormatA
GetUserDefaultLCID
GetStringTypeW
HeapDestroy
WriteConsoleA
LCMapStringA
GetStdHandle
GetOEMCP
GetConsoleMode
QueryPerformanceCounter
GetCPInfo
CreateFileA
EnumSystemLocalesA
VirtualQuery
TlsSetValue
Sleep
CloseHandle
GetTickCount
IsValidLocale
HeapReAlloc
GetCommandLineA
SetUnhandledExceptionFilter
TerminateProcess
GetStringTypeA
FlushFileBuffers
TlsAlloc
SetConsoleCtrlHandler
GetTimeFormatA
CompareStringW
LCMapStringW
GetModuleHandleA
InterlockedDecrement
LeaveCriticalSection
GetSystemTimeAsFileTime
GetProcAddress
GetEnvironmentStrings
VirtualAlloc
GetCurrentThread
MultiByteToWideChar
GetFileType
HeapFree
IsDebuggerPresent
GetStartupInfoA
EnterCriticalSection
GetACP
UnhandledExceptionFilter
VirtualFree
WideCharToMultiByte
InterlockedIncrement
HeapSize
GetCurrentProcessId
HeapAlloc
GetCurrentProcess
GetTimeZoneInformation
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
ReadFile
FreeEnvironmentStringsA
GetModuleHandleW
InterlockedExchange
LoadLibraryA
GetLastError
GetLocaleInfoW
GetConsoleCP
WriteConsoleW
DeleteCriticalSection
TlsGetValue
oleaut32
LoadTypeLi
user32
ReleaseCapture
HideCaret
TrackPopupMenu
GetMenu
GetWindowTextLengthA
CharNextA
EndDialog
GetFocus
PeekMessageA
FrameRect
DrawFocusRect
IsRectEmpty
GetClassInfoA
GetSystemMetrics
SystemParametersInfoA
GetScrollRange
PostMessageA
OffsetRect
ReleaseDC
IsDialogMessageA
LoadMenuA
InflateRect
GetDlgItemInt
CallWindowProcA
SetActiveWindow
MsgWaitForMultipleObjects
GetSysColor
CopyRect
MoveWindow
GetWindow
DispatchMessageA
GetWindowRect
PostQuitMessage
SetRect
SetWindowTextA
IsWindow
ValidateRect
UnregisterClassA
PostThreadMessageA
DeferWindowPos
GetParent
ExcludeUpdateRgn
SetWindowLongA
DestroyCursor
GetClassNameA
SetClipboardData
GetDlgCtrlID
EndPaint
ShowScrollBar
LoadAcceleratorsA
DestroyWindow
KillTimer
GetSubMenu
GetKeyState
LoadCursorA
OpenClipboard
RegisterClassExA
ClientToScreen
ModifyMenuA
CreateWindowExA
IsIconic
GetMenuItemCount
LoadIconA
GetScrollPos
EnumChildWindows
SendDlgItemMessageA
CreatePopupMenu
IsWindowEnabled
GetMessageA
LoadStringA
DrawMenuBar
ShowWindow
GetDesktopWindow
GetWindowPlacement
SendMessageA
SetDlgItemTextA
SetFocus
RegisterClassA
SetMenuItemBitmaps
SetCapture
InvalidateRect
CharLowerA
TranslateMessage
BeginPaint
DrawTextA
CharUpperA
ScreenToClient
MapDialogRect
DestroyAcceleratorTable
Sections
.text Size: 80KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ