Static task
static1
Behavioral task
behavioral1
Sample
5cc41b278d3f12b85c43617acec5776234ebde0bff4c4f95eb0e0c5959d70122.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5cc41b278d3f12b85c43617acec5776234ebde0bff4c4f95eb0e0c5959d70122.exe
Resource
win10v2004-20221111-en
General
-
Target
5cc41b278d3f12b85c43617acec5776234ebde0bff4c4f95eb0e0c5959d70122
-
Size
807KB
-
MD5
1d5d8c5ce3854de61b28de7ca73093f1
-
SHA1
7ca1dc896eea96dcb2403ed07f8fe456896669d2
-
SHA256
5cc41b278d3f12b85c43617acec5776234ebde0bff4c4f95eb0e0c5959d70122
-
SHA512
7026f062b68aa354c52bd7fdfd5ab9c8b85165db9464d24782f6d369ec716a87783e1de8cbe382afc5077b3e2d5cc7ba4548b48fa0f4807b5e73a014c95f6eda
-
SSDEEP
24576:Oe9oAekULASxHBwYyWvBas5pQvMl6gaO:5WAePk2hwYyNqpQvMEgaO
Malware Config
Signatures
Files
-
5cc41b278d3f12b85c43617acec5776234ebde0bff4c4f95eb0e0c5959d70122.exe windows x86
dea0a2dba0e45e8acec99c05667e7d2a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
CreateFileW
GetLocalTime
CloseHandle
GetFileInformationByHandle
FileTimeToSystemTime
PeekNamedPipe
GetFullPathNameA
SetConsoleMode
ReadConsoleInputA
FindFirstFileExA
GetDriveTypeA
FileTimeToLocalFileTime
WideCharToMultiByte
WriteFile
GetTickCount
SystemTimeToFileTime
UnmapViewOfFile
SetFilePointer
GetFileSize
OutputDebugStringA
FindNextFileW
FindClose
CreateDirectoryW
FindFirstFileW
GetCurrentDirectoryW
ExitProcess
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
GetSystemTimeAsFileTime
HeapFree
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
MultiByteToWideChar
GetCPInfo
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
HeapSize
GetProcAddress
GetModuleHandleW
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
HeapCreate
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetLocaleInfoW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapReAlloc
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryW
CreateFileA
SetStdHandle
WriteConsoleW
SetEndOfFile
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
GetVersion
GlobalMemoryStatus
LoadLibraryA
GetVersionExA
FlushConsoleInputBuffer
GetDriveTypeW
user32
MessageBoxA
GetProcessWindowStation
GetDesktopWindow
GetUserObjectInformationW
shell32
SHGetFileInfoW
SHGetFolderPathW
ws2_32
WSAStartup
inet_addr
select
WSAGetLastError
htons
inet_ntoa
recv
shutdown
WSASetLastError
socket
getservbyname
__WSAFDIsSet
closesocket
gethostbyname
send
connect
gethostname
ioctlsocket
getpeername
WSACleanup
shlwapi
PathAppendW
advapi32
ReportEventA
DeregisterEventSource
RegisterEventSourceA
Sections
.text Size: 532KB - Virtual size: 532KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 162KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 67KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ