Static task
static1
Behavioral task
behavioral1
Sample
c06252ad3910d3753b595bc2dd7a46d9c066baaa4945f01252ed51dc80c06c62.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c06252ad3910d3753b595bc2dd7a46d9c066baaa4945f01252ed51dc80c06c62.exe
Resource
win10v2004-20221111-en
General
-
Target
c06252ad3910d3753b595bc2dd7a46d9c066baaa4945f01252ed51dc80c06c62
-
Size
47KB
-
MD5
3a664fb762f3c856029629a67a63ec32
-
SHA1
3ef4f4afc67b163db2bfa1593fd4a6c0e3285e36
-
SHA256
c06252ad3910d3753b595bc2dd7a46d9c066baaa4945f01252ed51dc80c06c62
-
SHA512
e37b95a70277ad6c0b9fc2cb8be815a609d28be4098ada5b0e75f4dba03f9749f9875ba27ec3e55da0c270cd5b5f7db2edeef278ceec904c6531de44519ffcb4
-
SSDEEP
768:plWLTrnKgwCSSDaXdF+lF7P7J5reaCn+9JO2shY8PLUpb6VPvYqBN6cNFfAXwNB:plWLTrVNSY+A37feaCMJDmYsLIb4PvYI
Malware Config
Signatures
Files
-
c06252ad3910d3753b595bc2dd7a46d9c066baaa4945f01252ed51dc80c06c62.exe windows x86
a8e9f679f76d7326b1bac7f33f4a4785
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetCommandLineW
WritePrivateProfileStringW
ExitProcess
GetCurrentDirectoryW
SetCurrentDirectoryW
FindFirstFileW
CreateProcessW
GetPrivateProfileStringW
user32
RegisterClassExW
LoadCursorW
LoadIconW
CreateWindowExW
DialogBoxParamW
TranslateMessage
DispatchMessageW
GetDlgItem
SetWindowTextW
EndDialog
MessageBoxW
DefWindowProcW
PostQuitMessage
GetMessageW
comdlg32
GetOpenFileNameW
advapi32
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
shell32
CommandLineToArgvW
ShellExecuteW
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ