Static task
static1
Behavioral task
behavioral1
Sample
c986af42c8e9932833b957d18521511ddf63a78cda308b237a43143b5c848d0a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c986af42c8e9932833b957d18521511ddf63a78cda308b237a43143b5c848d0a.exe
Resource
win10v2004-20220812-en
General
-
Target
c986af42c8e9932833b957d18521511ddf63a78cda308b237a43143b5c848d0a
-
Size
3.7MB
-
MD5
30861aeb28bc144329660462f8ec2417
-
SHA1
74d053f045996002d05c5bd15f2554ebd1eda715
-
SHA256
c986af42c8e9932833b957d18521511ddf63a78cda308b237a43143b5c848d0a
-
SHA512
a24b92f37d8a94cf09d7a654740ef60cea020a1ac5161d847f0d5b59032aefbf48b9f9623131a9632f2170da08ce07e6cf797786cc7fb69d9296be7b0cc54ada
-
SSDEEP
98304:si7hQiJR13XRPjPz9h1AN4NeI7mRR7HNGgH3fXP/xJ0/5TrJ7S:97hQiJR13XRPjPz9h1AN4NeKmRR7Hp/3
Malware Config
Signatures
Files
-
c986af42c8e9932833b957d18521511ddf63a78cda308b237a43143b5c848d0a.exe windows x86
6e6948c17f35fe809279b81b2809baab
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
SetLastError
GetLastError
RemoveDirectoryA
LoadLibraryA
GetProcAddress
GetTempPathA
GetFileAttributesA
GetCurrentProcess
WideCharToMultiByte
MultiByteToWideChar
AddVectoredExceptionHandler
CreateFileA
HeapAlloc
HeapFree
CreateMutexA
GetModuleHandleExW
InterlockedCompareExchange
ExitProcess
GetModuleHandleA
GetVersionExA
VirtualAlloc
VirtualFree
CloseHandle
Sleep
GetProcessHeap
GetTickCount
WriteConsoleW
CreateFileW
GetConsoleCP
FlushFileBuffers
SetStdHandle
LoadLibraryW
OutputDebugStringW
LCMapStringW
IsProcessorFeaturePresent
ReadFile
GetSystemTimeAsFileTime
RtlUnwind
GetCommandLineA
InterlockedDecrement
AreFileApisANSI
HeapSize
IsDebuggerPresent
InterlockedIncrement
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThreadId
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
SetFilePointer
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetStringTypeW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
LoadLibraryExW
HeapReAlloc
SetEndOfFile
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
user32
TranslateMessage
PostMessageA
MessageBoxA
DispatchMessageW
ShowWindow
DispatchMessageA
MessageBoxW
PeekMessageA
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 139KB - Virtual size: 150KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ