Static task
static1
Behavioral task
behavioral1
Sample
c13b23b38087d60cb2d2441ffe264d016b638ad6afaa0489ec703d443b00df14.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c13b23b38087d60cb2d2441ffe264d016b638ad6afaa0489ec703d443b00df14.exe
Resource
win10v2004-20220812-en
General
-
Target
c13b23b38087d60cb2d2441ffe264d016b638ad6afaa0489ec703d443b00df14
-
Size
138KB
-
MD5
1101a2c3b3d2d3a3f12d8f9456f4d948
-
SHA1
1f47fb946113261bc61c038e72772df7975cbda8
-
SHA256
c13b23b38087d60cb2d2441ffe264d016b638ad6afaa0489ec703d443b00df14
-
SHA512
9c49e32b323daaa32496abd70f24136187d1689332f3eae67c257652ce468878b36af9b90b69c80133ad380d0b26d24adb9445c2ad2e5ec5e20ce1200fe81e9e
-
SSDEEP
3072:F0myqqiDm7HRRbVxU0PvcoF1ZBIdzj+57fGfS5RVv:3JqxDbc0tF1fIdOBUS5jv
Malware Config
Signatures
Files
-
c13b23b38087d60cb2d2441ffe264d016b638ad6afaa0489ec703d443b00df14.exe windows x86
71f458a3392b1762de738f2a837c2b3d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
CreateFileA
GetFileAttributesA
HeapAlloc
GetProcessHeap
HeapReAlloc
HeapFree
CloseHandle
lstrlenA
GetSystemTimeAsFileTime
RtlUnwind
InterlockedExchange
VirtualQuery
GetSystemDirectoryA
SetCurrentDirectoryA
WritePrivateProfileStringA
GetFullPathNameA
user32
wvsprintfA
advapi32
CloseServiceHandle
StartServiceA
CreateServiceA
OpenSCManagerA
shell32
DragAcceptFiles
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 980B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE