Static task
static1
Behavioral task
behavioral1
Sample
c1583f07901771808294564b59ca01331e0e1219021a8e126c98750e5efecfc8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c1583f07901771808294564b59ca01331e0e1219021a8e126c98750e5efecfc8.exe
Resource
win10v2004-20220901-en
General
-
Target
c1583f07901771808294564b59ca01331e0e1219021a8e126c98750e5efecfc8
-
Size
710KB
-
MD5
865e2ddabe3b4132a5b9d7d636864200
-
SHA1
ab5ed4505ea244e0e56c71fe52ee56967f4eb440
-
SHA256
c1583f07901771808294564b59ca01331e0e1219021a8e126c98750e5efecfc8
-
SHA512
5829a2237e5e2fab44113eb8c0cec0003831c4fd70c001c684cf2ebc51eeae9fad8394c36ccb3fe7dc65d2203fff85117fb7405688411c1620774c9398564935
-
SSDEEP
12288:UfKcPm/4SCrAZ4Qz0uQSf23mlYzeH3LiteeN67uJTHLdEStAvzTaMJyDh0xhA:UfKcNrAZhzXvH7iteeU7YrdrtgzTaMJM
Malware Config
Signatures
Files
-
c1583f07901771808294564b59ca01331e0e1219021a8e126c98750e5efecfc8.exe windows x86
bccbdcfd22276acf22fe308f7326d80f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDriveStringsA
IsBadCodePtr
GetComputerNameExW
GetAtomNameW
GlobalAddAtomA
CreateSemaphoreW
ConnectNamedPipe
FindClose
SetVolumeLabelA
CreateTimerQueueTimer
_lread
MoveFileExA
GetThreadTimes
FindNextVolumeMountPointW
DuplicateHandle
MapViewOfFile
GetDiskFreeSpaceW
SetFilePointer
lstrcmpW
UnhandledExceptionFilter
FreeUserPhysicalPages
GetShortPathNameW
SetWaitableTimer
GetFileSizeEx
GetPrivateProfileSectionNamesW
DeleteTimerQueue
FreeEnvironmentStringsW
CreateFileMappingW
SuspendThread
SetSystemTime
CancelWaitableTimer
EscapeCommFunction
EnumUILanguagesA
SetEnvironmentVariableA
WideCharToMultiByte
ChangeTimerQueueTimer
GetCalendarInfoW
LCMapStringA
FindAtomW
GetCurrentThreadId
GetCommMask
_lclose
SetFileAttributesA
FindFirstFileA
GetSystemTimeAdjustment
FindResourceExA
_lwrite
DefineDosDeviceA
BackupSeek
lstrcpynW
SetTapeParameters
IsValidCodePage
GetStringTypeExA
LocalFlags
SetFileAttributesW
IsBadWritePtr
GlobalFree
EnumResourceLanguagesA
GetSystemTime
RemoveDirectoryW
IsValidLanguageGroup
GetVolumeInformationA
EnumResourceNamesW
SetDefaultCommConfigW
IsValidLocale
FindNextVolumeA
lstrcpyW
lstrcpynA
InterlockedIncrement
MoveFileExW
WritePrivateProfileStructA
SetCurrentDirectoryW
GetSystemWindowsDirectoryW
GetFileAttributesW
CreateEventW
GetSystemPowerStatus
IsBadStringPtrA
WritePrivateProfileStringA
SetSystemPowerState
EnumTimeFormatsW
CreateWaitableTimerA
GetCommModemStatus
GetPrivateProfileSectionW
GetCPInfoExW
SetMailslotInfo
GetShortPathNameA
ConvertDefaultLocale
GetPrivateProfileIntW
GetPrivateProfileStringW
GetExitCodeThread
GetWindowsDirectoryW
GetNamedPipeHandleStateW
FatalAppExitA
SetLocaleInfoA
LocalAlloc
GetProcessPriorityBoost
WritePrivateProfileStructW
UpdateResourceA
GetDateFormatW
GlobalGetAtomNameW
QueryPerformanceCounter
UnmapViewOfFile
InterlockedDecrement
GetProfileIntW
GetCPInfo
GetFileTime
GetFileAttributesA
GetDevicePowerState
GetCalendarInfoA
EndUpdateResourceW
GetAtomNameA
shlwapi
PathAppendA
user32
DialogBoxIndirectParamW
DrawAnimatedRects
SetMenuItemInfoA
SetDlgItemTextW
MessageBoxExA
SetActiveWindow
UpdateWindow
CharLowerBuffA
SendMessageCallbackW
RegisterDeviceNotificationW
EnumChildWindows
GetWindowLongA
SetParent
FillRect
MapDialogRect
DlgDirListW
SetThreadDesktop
TrackMouseEvent
GetDesktopWindow
SetWindowContextHelpId
DestroyWindow
GetMenuBarInfo
GetDialogBaseUnits
SetDebugErrorLevel
LoadMenuA
DdeClientTransaction
Sections
.text Size: 227KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 273KB - Virtual size: 656KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 205KB - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ