Static task
static1
Behavioral task
behavioral1
Sample
1c0f3aca0f771f94e45f818d4c484dfa01946a9d4748786cc3231437de73d010.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1c0f3aca0f771f94e45f818d4c484dfa01946a9d4748786cc3231437de73d010.exe
Resource
win10v2004-20220812-en
General
-
Target
1c0f3aca0f771f94e45f818d4c484dfa01946a9d4748786cc3231437de73d010
-
Size
252KB
-
MD5
c8a442855573b8c0968b6c8d6039ce31
-
SHA1
602aee7e57baf7bcfeae03c49d57f032b091d314
-
SHA256
1c0f3aca0f771f94e45f818d4c484dfa01946a9d4748786cc3231437de73d010
-
SHA512
7c812cdbd75f21c5e92296142c705c57785f0981b4c316f42ee231d83afa50304f9402b583b743b5cd1086db47a9f2cb9a99496b49f77de8719b160c09713e80
-
SSDEEP
6144:5nGUANAZF05MlawRW6NDWWBtb3ED51c9mKg:0hAP7lawDNPBtbYc9rg
Malware Config
Signatures
Files
-
1c0f3aca0f771f94e45f818d4c484dfa01946a9d4748786cc3231437de73d010.exe windows x86
bccdc25eff78101f973b694cba84bea8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryExA
PulseEvent
GetComputerNameW
FindResourceExW
GetVersion
ExitThread
GetSystemTimeAdjustment
PurgeComm
GetEnvironmentVariableW
QueryDosDeviceA
TlsGetValue
GetThreadPriority
GetCurrentDirectoryW
GetFileAttributesA
GetLongPathNameA
ReadConsoleA
GetFileType
GetDriveTypeW
SetCurrentDirectoryA
EnumResourceNamesA
IsBadWritePtr
WritePrivateProfileStructA
SetStdHandle
SearchPathW
SetThreadLocale
EnumCalendarInfoA
CreateDirectoryW
EraseTape
GetLargestConsoleWindowSize
ConnectNamedPipe
CreateIoCompletionPort
WriteProcessMemory
OpenFile
VirtualProtect
GetVersionExA
WriteFile
GetTimeZoneInformation
SetConsoleMode
FormatMessageW
MoveFileW
FindFirstFileExW
GetDateFormatA
GetCommConfig
GetShortPathNameA
WriteConsoleOutputCharacterA
ReadDirectoryChangesW
GetDiskFreeSpaceW
lstrcmpiA
CompareStringA
IsProcessorFeaturePresent
lstrcpyA
EnumSystemCodePagesW
FatalAppExitA
GetCommandLineW
GetTapeStatus
CreateMutexW
ExpandEnvironmentStringsW
lstrcatW
FreeEnvironmentStringsA
SetFileTime
CreateDirectoryA
GetModuleHandleA
SetThreadAffinityMask
SwitchToFiber
LocalLock
SetThreadPriorityBoost
EnumSystemCodePagesA
SetMailslotInfo
VirtualQuery
SetSystemTime
LoadResource
VirtualFree
GetCommState
GetOverlappedResult
SetupComm
GetDiskFreeSpaceExA
GlobalReAlloc
GetBinaryTypeW
SetConsoleCursorPosition
GetProcessHeap
FreeLibraryAndExitThread
ClearCommBreak
LCMapStringA
GetACP
MoveFileExA
GetCommandLineA
VirtualAlloc
GetTickCount
ExitProcess
user32
InSendMessage
SetTimer
OpenIcon
EnableWindow
CreateMenu
IsCharAlphaNumericA
EnableMenuItem
InsertMenuItemA
CreateIconIndirect
SetPropA
CharNextA
GetScrollBarInfo
LoadKeyboardLayoutW
GetClipboardFormatNameW
CallNextHookEx
ShowCursor
gdi32
WidenPath
GetNearestPaletteIndex
PathToRegion
ArcTo
CreateFontIndirectW
Polygon
GetObjectA
GetEnhMetaFileBits
GetSystemPaletteEntries
GetWindowOrgEx
CreateEllipticRgn
FrameRgn
GetFontData
ExtEscape
SetPixel
DeleteObject
ScaleViewportExtEx
GetTextAlign
comdlg32
GetSaveFileNameA
PageSetupDlgW
CommDlgExtendedError
advapi32
MakeSelfRelativeSD
LookupAccountNameA
GetUserNameA
RegQueryValueExW
CryptDestroyKey
ImpersonateLoggedOnUser
StartServiceCtrlDispatcherA
OpenSCManagerW
RegOpenKeyA
GetSecurityDescriptorLength
StartServiceCtrlDispatcherW
LookupPrivilegeValueW
IsValidAcl
StartServiceA
AccessCheckAndAuditAlarmA
InitiateSystemShutdownA
AddAce
QueryServiceConfigW
GetSecurityDescriptorGroup
DuplicateTokenEx
QueryServiceConfigA
BuildSecurityDescriptorW
DeleteService
SetSecurityDescriptorGroup
RegEnumKeyExW
RegQueryInfoKeyW
ClearEventLogW
CloseEventLog
ReportEventA
OpenThreadToken
InitializeSid
shell32
SHGetDesktopFolder
SHGetSpecialFolderLocation
SHChangeNotify
FindExecutableA
ole32
OleRegGetMiscStatus
oleaut32
LoadTypeLibEx
SafeArrayGetElement
SafeArrayPutElement
VariantCopy
SafeArrayCreate
comctl32
ImageList_Create
ImageList_Replace
shlwapi
SHStrDupW
PathGetCharTypeW
PathAddBackslashW
StrRetToStrW
UrlGetPartW
StrCmpNA
SHCopyKeyA
wvnsprintfW
PathCombineW
PathGetDriveNumberA
PathRenameExtensionW
SHEnumValueW
PathRemoveBlanksW
UrlGetPartA
Sections
.text Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 232KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE