Static task
static1
Behavioral task
behavioral1
Sample
c1fb4be21696895d9628807ddfc890f4ee0a4ce6f065744fe863a9812ecae940.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c1fb4be21696895d9628807ddfc890f4ee0a4ce6f065744fe863a9812ecae940.exe
Resource
win10v2004-20221111-en
General
-
Target
c1fb4be21696895d9628807ddfc890f4ee0a4ce6f065744fe863a9812ecae940
-
Size
56KB
-
MD5
2df469427e3b914feead5a6c91b825a2
-
SHA1
3eb82438486119096b7dcdb7e4bbdd2919cf8826
-
SHA256
c1fb4be21696895d9628807ddfc890f4ee0a4ce6f065744fe863a9812ecae940
-
SHA512
d623bfb4f3869f184302265c346c81bff8376ab7347547571302c4702b30728a1c82689073f4814aab3f31c36d94314d50bfde78038865a2008640d2efb3fd8f
-
SSDEEP
1536:+wRhNYZpgpuFeRRw7L6MQ5lcVtELZ1WEkO/:fdYZbFeLw7L636VtEF1hk
Malware Config
Signatures
Files
-
c1fb4be21696895d9628807ddfc890f4ee0a4ce6f065744fe863a9812ecae940.exe windows x86
da2666d3347f129193ab91a0eab85c0c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
DbgPrint
RtlInitUnicodeString
NtOpenKey
NtClose
api-ms-win-core-localregistry-l1-1-0
RegCreateKeyExW
RegDeleteTreeW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegQueryInfoKeyW
api-ms-win-core-processthreads-l1-1-0
SetThreadPriority
GetCurrentThread
CreateThread
GetCurrentProcess
CreateProcessW
OpenProcessToken
user32
CharNextW
GetKeyboardLayout
GetSystemMetrics
ExitWindowsEx
MessageBoxW
LoadStringW
LoadRemoteFonts
DefWindowProcW
RegisterClassExW
DestroyWindow
CreateWindowExW
SystemParametersInfoW
userenv
ord175
msvcrt
_ismbblead
_XcptFilter
_exit
_cexit
exit
_wcsicmp
memset
memmove
_vsnwprintf
_initterm
_acmdln
_amsg_exit
__setusermatherr
__p__fmode
__set_app_type
?terminate@@YAXXZ
_except_handler4_common
_controlfp
__getmainargs
__p__commode
kernel32
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedExchange
LoadLibraryA
RegOpenKeyExA
RegQueryValueExA
ExpandEnvironmentStringsA
LoadLibraryExA
InterlockedCompareExchange
DelayLoadFailureHook
HeapSetInformation
SetCurrentDirectoryW
FormatMessageW
GetFileAttributesExW
GetSystemDirectoryW
SetLastError
ExpandEnvironmentStringsW
GetUserDefaultLangID
SetEvent
OpenEventW
Sleep
WaitForSingleObject
CloseHandle
GetLastError
SetEnvironmentVariableW
SearchPathW
GetCurrentThreadId
CompareFileTime
LoadLibraryW
GetProcAddress
FreeLibrary
GetEnvironmentVariableW
LocalAlloc
LocalFree
GetVersionExW
lstrlenW
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ukqsdpa Size: 4KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE