Static task
static1
Behavioral task
behavioral1
Sample
c61ad1921009710fff0255e05a209ad6462ae16a40c14bc3db1d1a413a7794af.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c61ad1921009710fff0255e05a209ad6462ae16a40c14bc3db1d1a413a7794af.exe
Resource
win10v2004-20221111-en
General
-
Target
c61ad1921009710fff0255e05a209ad6462ae16a40c14bc3db1d1a413a7794af
-
Size
143KB
-
MD5
20ceb58029b66b6704b9be159e4d1220
-
SHA1
4caf793cf8471f285041a6fc2a6ad401e9636d97
-
SHA256
c61ad1921009710fff0255e05a209ad6462ae16a40c14bc3db1d1a413a7794af
-
SHA512
3720b8cf05ff3a0019a1418b4510efb3bdc4eef9f61d4117c9acd62c0586063fbabeb31b8d14cf8bdff917be5236e87dbe1e7100e34eed2fbaa234285cc0faa8
-
SSDEEP
3072:3E5Cxp6UXHHICHGyl/bG7hxf8DD39oigXa:3EYL7GoC7jUD3n
Malware Config
Signatures
Files
-
c61ad1921009710fff0255e05a209ad6462ae16a40c14bc3db1d1a413a7794af.exe windows x86
7372211779ecc4a8990ab3797c386ce3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
GetCurrentThread
VirtualAlloc
GetStartupInfoA
GetCurrentProcess
GetProcessHeap
FormatMessageA
LocalAlloc
FreeLibrary
InterlockedExchange
GetModuleFileNameA
CreateEventA
GetModuleHandleA
SetPriorityClass
GetCommandLineA
GetEnvironmentVariableA
SetConsoleCtrlHandler
DuplicateHandle
GetStdHandle
GetPriorityClass
CreateProcessA
SetStdHandle
SetLastError
SetEvent
Sleep
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
WaitForSingleObject
CloseHandle
SetThreadPriority
CreateThread
user32
LoadIconW
LoadCursorA
LoadIconA
gdi32
GetStockObject
msvcrt
exit
_cexit
_XcptFilter
__initenv
_c_exit
_stricmp
atoi
__getmainargs
_exit
_initterm
__setusermatherr
strrchr
sscanf
_strnicmp
strtoul
rewind
calloc
fgetc
tolower
_strcmpi
getenv
printf
isspace
fopen
_snprintf
strncpy
_iob
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
fgets
fclose
sprintf
_spawnlp
_vsnprintf
_acmdln
advapi32
RegOpenKeyA
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data4 Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data3 Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text14 Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text13 Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text12 Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text5 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 908B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 704B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ