Static task
static1
Behavioral task
behavioral1
Sample
c568cf3ac0017da419d9e791bd0d44574aff4cb5e4caa8f83e1a11b74a4cc55d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c568cf3ac0017da419d9e791bd0d44574aff4cb5e4caa8f83e1a11b74a4cc55d.exe
Resource
win10v2004-20220812-en
General
-
Target
c568cf3ac0017da419d9e791bd0d44574aff4cb5e4caa8f83e1a11b74a4cc55d
-
Size
254KB
-
MD5
29030417e040ad0a17af352fb1541163
-
SHA1
5df625cd94a71aab329e89a07803b2d953f3609a
-
SHA256
c568cf3ac0017da419d9e791bd0d44574aff4cb5e4caa8f83e1a11b74a4cc55d
-
SHA512
be921a8fde8186c890f7d645ca035da3311cfab2457f42ab2c817a0c37ada018da9e5d8f99457493cebb89203fe56dfc0ff359aebfd7968ca31e16ab23ac50bc
-
SSDEEP
3072:l5ykGnUS6Cj5j1ooAHquzf6+AuWgPcEBFZJVwrkTQb2zV3Mfr5Eb56uoal6CqOMN:TBoUS6i5j+w+Ve4TQqzV8fNEb0ucCVM
Malware Config
Signatures
Files
-
c568cf3ac0017da419d9e791bd0d44574aff4cb5e4caa8f83e1a11b74a4cc55d.exe windows x86
2e57f5f9bd6ea03debd9c81839d61820
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsDebuggerPresent
LocalReAlloc
LocalFree
IsBadWritePtr
GetCurrentProcess
SetFilePointer
HeapReAlloc
FreeLibrary
GlobalDeleteAtom
VirtualFree
lstrcatA
GetCurrentThread
GetVolumeInformationA
lstrcpyA
LoadResource
WritePrivateProfileStringA
LCMapStringW
GetVersionExA
GetStdHandle
WideCharToMultiByte
FindNextFileA
WriteFile
ReadFile
GlobalAddAtomA
GetFileAttributesA
ClearCommError
lstrlenA
InitializeCriticalSection
FlushInstructionCache
GlobalGetAtomNameA
GetCommandLineA
GetSystemDirectoryA
Toolhelp32ReadProcessMemory
FindResourceA
UnlockFile
SetTimeZoneInformation
FindClose
GlobalReAlloc
HeapSize
ReadProcessMemory
GlobalAlloc
SetUnhandledExceptionFilter
InterlockedDecrement
SetSystemTime
GetStartupInfoA
TerminateProcess
SystemTimeToFileTime
IsBadCodePtr
RaiseException
FreeEnvironmentStringsW
GetFileSize
GetCPInfo
SetConsoleCursorInfo
FileTimeToSystemTime
DeleteFileA
LocalFileTimeToFileTime
GlobalFree
DuplicateHandle
GetModuleHandleA
HeapCreate
GetVersion
MulDiv
GetProcessVersion
SetConsoleTextAttribute
Beep
VirtualAlloc
UnhandledExceptionFilter
LocalAlloc
LCMapStringA
SetHandleCount
CloseHandle
InterlockedIncrement
LeaveCriticalSection
RtlUnwind
TlsAlloc
TlsSetValue
CreateFileA
GetCurrentThreadId
SetEndOfFile
lstrcmpiA
GlobalUnlock
GlobalFindAtomA
HeapAlloc
SetCurrentDirectoryA
FreeEnvironmentStringsA
GetFullPathNameA
LockResource
FindFirstFileA
GetFileTime
SetEnvironmentVariableA
MultiByteToWideChar
HeapFree
DeleteCriticalSection
HeapDestroy
GetEnvironmentStringsA
LockFile
lstrcmpA
GetTimeZoneInformation
GetThreadLocale
TlsFree
ReleaseActCtx
MapUserPhysicalPages
LocalUnlock
LoadLibraryA
SetStdHandle
GetWindowsDirectoryA
SetErrorMode
GetProcAddress
GetStringTypeW
GlobalLock
SetLastError
GetEnvironmentStringsW
GetEnvironmentVariableA
GetStringTypeA
lstrcpynA
GlobalHandle
GetFileType
FatalExit
EnterCriticalSection
CompareStringA
FileTimeToLocalFileTime
GetLastError
SetConsoleCursorPosition
CompareStringW
GlobalFlags
SystemTimeToTzSpecificLocalTime
GetCurrentDirectoryA
GetOEMCP
SetFileAttributesA
TlsGetValue
GetDriveTypeA
IsBadReadPtr
Sleep
SetFileTime
FlushFileBuffers
ExitProcess
InitializeSListHead
IsValidLocale
DosDateTimeToFileTime
SetConsoleScreenBufferSize
GetACP
GetModuleFileNameA
gdi32
CreateBitmap
RestoreDC
EnumEnhMetaFile
ScaleViewportExtEx
OffsetViewportOrgEx
SelectObject
GetStockObject
SetBkColor
DeleteDC
TextOutA
DeleteObject
GetDCPenColor
RectVisible
CreateDIBitmap
GetDeviceCaps
SetViewportOrgEx
RoundRect
SetMapMode
Escape
GdiPlayDCScript
gdiPlaySpoolStream
PtInRegion
PtVisible
GetObjectA
SetPolyFillMode
GetRelAbs
SetWindowExtEx
SetViewportExtEx
ScaleWindowExtEx
SaveDC
GetClipBox
CreateEllipticRgn
SetTextColor
ExtTextOutA
user32
SetForegroundWindow
CreateWindowExA
GetMenuState
GetMenuCheckMarkDimensions
IsDialogMessageA
BeginPaint
EnableMenuItem
EndPaint
CallWindowProcA
SetWindowTextA
UpdateWindow
CheckMenuItem
GetMenuItemID
LoadBitmapA
RemovePropA
GetCapture
SetWindowsHookExA
DestroyWindow
GetFocus
GetSysColorBrush
GetParent
GetWindowTextA
ModifyMenuA
GetLastActivePopup
WinHelpA
IsWindow
GetWindowPlacement
GetSysColor
CopyRect
SetPropA
SetCursor
ValidateRect
CharUpperA
GetSystemMetrics
SystemParametersInfoA
LoadStringA
GetCursorPos
AdjustWindowRectEx
GetWindowRect
GetDC
IsWindowEnabled
GetActiveWindow
GetWindowTextLengthA
DrawIcon
DrawTextA
GetMenuItemCount
GetWindowLongA
GetDlgCtrlID
ShowWindow
TranslateMessage
PostQuitMessage
GetPropA
SetWindowLongA
EndDialog
GetClassLongA
MapWindowPoints
DispatchMessageA
IsWindowVisible
GetClientRect
PtInRect
wsprintfA
GetMessageTime
GetClassInfoA
GetSubMenu
GetDlgItem
GetNextDlgTabItem
GetClassNameA
ExitWindowsEx
MessageBoxA
EnableWindow
GrayStringA
CallNextHookEx
UnregisterClassA
LoadCursorA
ClientToScreen
GetMessageA
PostMessageA
TabbedTextOutA
GetMenu
SetActiveWindow
IsIconic
RegisterWindowMessageA
RegisterClassA
GetMessagePos
DefWindowProcA
LoadIconA
PeekMessageA
SetMenuItemBitmaps
CreateDialogIndirectParamA
ReleaseDC
SendMessageA
GetTopWindow
DdeEnableCallback
SendDlgItemMessageA
DestroyMenu
SetFocus
GetForegroundWindow
UnhookWindowsHookEx
GetKeyState
GetWindow
SetWindowPos
winspool.drv
FindNextPrinterChangeNotification
DocumentPropertiesA
SeekPrinter
ClosePrinter
OpenPrinterA
comdlg32
LoadAlterBitmap
GetFileTitleA
Ssync_ANSI_UNICODE_Struct_For_WOW
dwLBSubclass
advapi32
RegSetValueExA
InitializeAcl
LsaSetSecurityObject
SystemFunction030
RegCloseKey
RegOpenKeyExA
GetAclInformation
RegCreateKeyExA
AddUsersToEncryptedFile
ElfCloseEventLog
LsaICLookupNamesWithCreds
ElfOldestRecord
MSChapSrvChangePassword
LockServiceDatabase
SystemFunction016
RegDeleteValueA
AddAccessDeniedAceEx
LsaEnumeratePrivileges
Sections
.text Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ