Static task
static1
Behavioral task
behavioral1
Sample
c390c8a49be6ec391e5d66af17b49b092cfcd28d8978994b004ee5cafc9c2bdd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c390c8a49be6ec391e5d66af17b49b092cfcd28d8978994b004ee5cafc9c2bdd.exe
Resource
win10v2004-20221111-en
General
-
Target
c390c8a49be6ec391e5d66af17b49b092cfcd28d8978994b004ee5cafc9c2bdd
-
Size
127KB
-
MD5
2377f942e07978610c49a237eb135421
-
SHA1
b1337323307eb8853b9f08abcc7b9bfd85691039
-
SHA256
c390c8a49be6ec391e5d66af17b49b092cfcd28d8978994b004ee5cafc9c2bdd
-
SHA512
93eb37af6f06290063aee174e97cb41bd5b724ca1e2ebd3e070d2db7c39f9644053b75839657379ab187e3e34c1aedebd99a928c0a48fca0d3e1795c58a4090e
-
SSDEEP
3072:hBxjgt/axQIL/AbxEGYlzE32if9bE15RPgP7dHhP70ogK2:h6/aHyGRFAE1XPgTdHhP70M
Malware Config
Signatures
Files
-
c390c8a49be6ec391e5d66af17b49b092cfcd28d8978994b004ee5cafc9c2bdd.exe windows x86
71c0fe7a79264e8a75dcf0077faff29d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CommConfigDialogA
GetThreadPriorityBoost
SleepEx
GetShortPathNameA
GetConsoleCursorInfo
GetProcAddress
GetPrivateProfileStructA
GetProcessAffinityMask
GetPrivateProfileStringA
GlobalWire
CreateFiber
GetCPInfoExA
GetThreadTimes
LockFile
WriteProfileSectionA
WritePrivateProfileStructA
ResumeThread
GetFileType
CopyFileA
WaitNamedPipeA
IsSystemResumeAutomatic
IsBadHugeReadPtr
FormatMessageA
WaitForSingleObject
UpdateResourceA
FreeConsole
DeleteAtom
GetTickCount
GetCPInfo
WideCharToMultiByte
VirtualAllocEx
GetNamedPipeInfo
GlobalAlloc
VirtualFreeEx
InitAtomTable
GetBinaryTypeA
GetSystemDefaultUILanguage
GlobalSize
GetLocalTime
ReadFile
GetProcessVersion
IsBadReadPtr
QueryPerformanceCounter
LocalUnlock
PeekNamedPipe
VirtualProtect
HeapValidate
GetProfileIntA
FindNextChangeNotification
GetCurrentThread
CreateFileA
GetPrivateProfileSectionA
GetDriveTypeA
GetFileSize
VirtualQueryEx
VirtualUnlock
LocalReAlloc
GetDiskFreeSpaceA
GetCurrentProcess
IsBadWritePtr
ReleaseSemaphore
CreateFileMappingA
FindClose
CreateRemoteThread
UnlockFile
IsDebuggerPresent
GetModuleFileNameA
ResetEvent
GetFileAttributesA
IsBadCodePtr
FreeResource
SetLastError
PulseEvent
ClearCommError
GetEnvironmentVariableA
GetLargestConsoleWindowSize
Beep
SetFileAttributesA
LockResource
GetVersion
GetOEMCP
OpenMutexA
OpenProcess
GlobalFree
IsValidCodePage
LoadLibraryA
GlobalUnfix
GlobalUnlock
CreateMutexA
GetSystemDefaultLCID
GetThreadContext
LocalHandle
GetThreadLocale
VirtualAlloc
GetThreadPriority
FlushFileBuffers
FlushConsoleInputBuffer
GetLongPathNameA
WriteProcessMemory
ReadConsoleA
GetConsoleOutputCP
EraseTape
LocalFlags
FreeLibrary
GetModuleHandleA
WriteFile
GetLogicalDrives
GetProcessHeap
SignalObjectAndWait
GetExitCodeThread
FlushViewOfFile
GetCommConfig
LocalAlloc
OutputDebugStringA
GlobalAddAtomA
GetFullPathNameA
LocalSize
GetPriorityClass
GetCommTimeouts
SearchPathA
GetPrivateProfileIntA
GetProcessTimes
CreateSemaphoreA
VirtualQuery
CreateConsoleScreenBuffer
LoadLibraryExA
GlobalReAlloc
GetEnvironmentStrings
UnmapViewOfFile
DosDateTimeToFileTime
CallNamedPipeA
GetACP
GlobalUnWire
GlobalHandle
FindResourceExA
GetTempPathA
DefineDosDeviceA
AreFileApisANSI
WaitForMultipleObjectsEx
SetErrorMode
GetUserDefaultLangID
GetDiskFreeSpaceExA
SetEvent
GetConsoleCP
HeapAlloc
FlushInstructionCache
LoadResource
GlobalCompact
CreateIoCompletionPort
OpenSemaphoreA
GetCommModemStatus
ClearCommBreak
MapViewOfFile
GetThreadSelectorEntry
GetCurrentProcessId
EndUpdateResourceA
GetCommandLineA
GetStartupInfoA
msvcrt
srand
__set_app_type
_controlfp
exit
strstr
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 111KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE