Static task
static1
Behavioral task
behavioral1
Sample
c66bc914b7d4d2ffa8de78b7c4cb0c20b89b4680bc4d1fb2d6c0d058b800ecbf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c66bc914b7d4d2ffa8de78b7c4cb0c20b89b4680bc4d1fb2d6c0d058b800ecbf.exe
Resource
win10v2004-20220812-en
General
-
Target
c66bc914b7d4d2ffa8de78b7c4cb0c20b89b4680bc4d1fb2d6c0d058b800ecbf
-
Size
492KB
-
MD5
e38bd63df97bcf26f27d7a7910043d88
-
SHA1
f4135e2402ce4179078ceddf0efef4f346ed3df6
-
SHA256
c66bc914b7d4d2ffa8de78b7c4cb0c20b89b4680bc4d1fb2d6c0d058b800ecbf
-
SHA512
32c8612d596e8dc1f2be9e7ed9460eb10aea9411c80891b9ab7d4eb15ce715d0ed96f9ea41a9606d9cd1f36a1386ee0ee8822e1c3f7c833faffec531b0ca9d52
-
SSDEEP
6144:DD5CLmrtjiZHK/PjiV90sBZE4QgQuKpUAwfRIVSefxW2CdV+Ev:JCLYj2kPm90aGxjxwIfwV+Ev
Malware Config
Signatures
Files
-
c66bc914b7d4d2ffa8de78b7c4cb0c20b89b4680bc4d1fb2d6c0d058b800ecbf.exe windows x86
beb59aa0f96b3215992e90d94405cb9f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumDateFormatsW
UnhandledExceptionFilter
InterlockedIncrement
Sleep
IsDebuggerPresent
GetLocaleInfoA
SetThreadPriority
GetCommandLineA
ReadConsoleOutputA
TlsAlloc
HeapCreate
CompareStringW
TerminateProcess
SetFileAttributesW
GetDateFormatA
GetStdHandle
FreeLibrary
FreeEnvironmentStringsA
IsValidLocale
GetEnvironmentStringsW
FindAtomW
GetConsoleTitleA
IsValidCodePage
GetSystemTimeAsFileTime
SleepEx
HeapAlloc
CreateDirectoryA
EnterCriticalSection
QueryPerformanceCounter
EnumSystemLocalesA
GetTempPathW
HeapFree
GetOEMCP
GetCPInfo
WritePrivateProfileStringW
WriteConsoleA
GetEnvironmentStrings
CreateMutexA
SetHandleCount
lstrcpy
SetUnhandledExceptionFilter
GetLastError
FlushFileBuffers
SetStdHandle
GetConsoleCP
InterlockedExchange
VirtualFreeEx
GetTickCount
VirtualQueryEx
GetDriveTypeA
GetPrivateProfileStructW
SetEnvironmentVariableA
MultiByteToWideChar
GetACP
SetConsoleCtrlHandler
GetFullPathNameA
TlsGetValue
GetFileType
GetModuleFileNameA
SetFilePointer
WriteFile
ReadConsoleOutputCharacterA
CreateNamedPipeW
GetConsoleOutputCP
HeapDestroy
LeaveCriticalSection
HeapSize
ExitProcess
GetProcAddress
WideCharToMultiByte
TlsSetValue
FreeEnvironmentStringsW
WriteConsoleInputA
HeapReAlloc
GetLocaleInfoW
CreateFileA
VirtualQuery
EnumCalendarInfoExA
GetCurrentThread
GetConsoleMode
GetStringTypeA
FindNextFileA
SetConsoleMode
GetCurrentProcess
SetLastError
OpenMutexA
GetTimeFormatA
GetUserDefaultLCID
GetModuleHandleA
GetStartupInfoA
TlsFree
FillConsoleOutputCharacterA
WriteConsoleOutputA
TerminateThread
SetConsoleTextAttribute
WaitForDebugEvent
VirtualAlloc
InitializeCriticalSection
CompareStringA
GetCurrentProcessId
InterlockedDecrement
GetTimeZoneInformation
LoadLibraryA
GetPrivateProfileSectionW
VirtualFree
DeleteCriticalSection
LCMapStringA
GetCurrentThreadId
ReadFile
WriteConsoleW
RtlUnwind
CloseHandle
GetProcessHeap
GetVersionExA
GetProfileIntW
GetStringTypeW
FindFirstFileA
CreateEventA
LCMapStringW
LocalUnlock
wininet
InternetSetCookieW
FtpGetCurrentDirectoryA
comctl32
ImageList_SetFlags
ImageList_AddIcon
ImageList_LoadImageA
ImageList_SetIconSize
GetEffectiveClientRect
CreateStatusWindow
DrawStatusText
ImageList_DrawIndirect
ImageList_Destroy
ImageList_Write
ImageList_DrawEx
InitMUILanguage
DrawStatusTextW
ImageList_GetImageRect
CreatePropertySheetPageW
ImageList_Add
MakeDragList
InitCommonControlsEx
ImageList_Copy
DestroyPropertySheetPage
ImageList_GetImageCount
ImageList_Duplicate
CreatePropertySheetPage
CreateToolbar
ImageList_GetIcon
ImageList_Create
gdi32
DeviceCapabilitiesExA
PlayMetaFileRecord
SetPaletteEntries
SetViewportOrgEx
CreatePen
PaintRgn
SetMapperFlags
GetArcDirection
GetCharABCWidthsA
StartPage
CreateFontIndirectW
GetLogColorSpaceA
SelectPalette
BeginPath
ExtSelectClipRgn
GetGlyphOutlineA
DrawEscape
ExtCreateRegion
user32
CreateDialogIndirectParamA
IsClipboardFormatAvailable
RegisterClassExA
GetWindowPlacement
CreateWindowExA
DdeAccessData
DefWindowProcA
GetClassInfoExW
DeferWindowPos
CloseWindow
GetWindowTextW
UnhookWindowsHookEx
SetForegroundWindow
MsgWaitForMultipleObjects
CharToOemBuffA
SetWindowsHookW
DdeImpersonateClient
UpdateWindow
MessageBoxW
RealChildWindowFromPoint
TranslateAccelerator
ModifyMenuA
GetCapture
AdjustWindowRectEx
RegisterClassA
ShowWindow
GetInputState
DestroyWindow
DialogBoxIndirectParamA
RemoveMenu
advapi32
CryptEnumProviderTypesW
RegQueryMultipleValuesW
StartServiceW
CryptDestroyHash
GetUserNameW
CryptSetKeyParam
CryptEnumProviderTypesA
RegDeleteKeyA
CryptDuplicateHash
RegCloseKey
RegLoadKeyA
CryptImportKey
LookupAccountNameW
RegSetKeySecurity
LookupPrivilegeDisplayNameW
CreateServiceW
RegQueryValueExW
LogonUserA
CryptSetProviderExA
CryptGetDefaultProviderA
comdlg32
GetOpenFileNameA
PrintDlgA
ChooseColorW
Sections
.text Size: 184KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ