Static task
static1
Behavioral task
behavioral1
Sample
c03cb34c76f7fd6b96643a4d3a745d7a9af3bfeda4b75c0d46c2314d302d3f19.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c03cb34c76f7fd6b96643a4d3a745d7a9af3bfeda4b75c0d46c2314d302d3f19.exe
Resource
win10v2004-20221111-en
General
-
Target
c03cb34c76f7fd6b96643a4d3a745d7a9af3bfeda4b75c0d46c2314d302d3f19
-
Size
304KB
-
MD5
7497c979d01b3591de8ca6afc15a1be5
-
SHA1
a955f8d535ad61dfe8fe2052b1be033284a9c363
-
SHA256
c03cb34c76f7fd6b96643a4d3a745d7a9af3bfeda4b75c0d46c2314d302d3f19
-
SHA512
8ffee5684610a7a9784c9eb1070e4ca522fb0b5887d30ac017c5f826bb6055f6f2514f02de7194cc6c938fa25280f038bf4060f8723d016bfd5458346a47c2d5
-
SSDEEP
1536:MakYgQrqK1rXhc4eu229cNyVz+TAyOhUiy0SYyywQaOqTm7RF9Yi40nDL1MIQ:MIc4eu22ect+kyOh6UZq0QorQ
Malware Config
Signatures
Files
-
c03cb34c76f7fd6b96643a4d3a745d7a9af3bfeda4b75c0d46c2314d302d3f19.exe windows x86
c653a41d0da78488295c3ca1306a9d2b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteW
ShellExecuteA
ole32
StringFromGUID2
CoCreateGuid
crypt32
CryptDecodeObject
CertGetNameStringW
CertFindCertificateInStore
CertCloseStore
CryptMsgClose
CryptMsgGetParam
CertFreeCertificateContext
CryptQueryObject
kernel32
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GlobalAddAtomA
SetEnvironmentVariableA
GetFileType
GetFileSize
RaiseException
RtlUnwind
UnhandledExceptionFilter
ExitThread
ExitProcess
GetCommandLineA
GetStartupInfoA
LoadLibraryExA
lstrcpynA
lstrlenA
VirtualFree
Sleep
LocalAlloc
TlsGetValue
TlsSetValue
CloseHandle
CompareStringA
CompareStringW
CreateDirectoryA
CreateDirectoryW
CreateEventA
CreateFileA
CreateFileW
CreateMutexA
CreateThread
DeleteCriticalSection
DeleteFileA
DeleteFileW
EnterCriticalSection
EnumCalendarInfoA
FindClose
FindFirstFileA
FindFirstFileW
FindResourceA
FormatMessageA
FormatMessageW
FreeLibrary
FreeResource
GetACP
GetCPInfo
GetCommandLineW
GetComputerNameA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatA
GetDiskFreeSpaceA
GetExitCodeThread
GetFileAttributesA
GetFileAttributesW
GetFullPathNameA
GetFullPathNameW
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetStdHandle
GetStringTypeExA
GetStringTypeExW
GetTempPathA
GetTempPathW
GetThreadLocale
GetTickCount
GetUserDefaultLangID
GetVersion
GetVersionExA
GlobalAlloc
GlobalDeleteAtom
GlobalFindAtomA
GlobalFree
GlobalGetAtomNameA
GlobalLock
GlobalUnlock
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LoadResource
LocalFree
LockResource
MulDiv
MultiByteToWideChar
ReadFile
ReleaseMutex
ResetEvent
ResumeThread
SetEndOfFile
SetErrorMode
SetEvent
SetFilePointer
SetLastError
SetThreadLocale
SizeofResource
VirtualAlloc
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringA
lstrcmpA
lstrcpyA
lstrlenW
WaitForMultipleObjects
EnumResourceNamesW
CreateProcessW
EnumDateFormatsExW
EnumDateFormatsExA
SystemTimeToFileTime
GetTimeFormatA
GetSystemTimeAsFileTime
OutputDebugStringA
InterlockedIncrement
InterlockedDecrement
GetOEMCP
GetModuleHandleW
TlsAlloc
TlsFree
HeapFree
HeapAlloc
GetTimeZoneInformation
TerminateProcess
SetUnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapDestroy
HeapCreate
QueryPerformanceCounter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
HeapReAlloc
GetSystemInfo
GetConsoleCP
GetConsoleMode
FlushFileBuffers
Sections
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 209KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ