Static task
static1
Behavioral task
behavioral1
Sample
c1ed69b7768b654b2eb8e295a383535414afaaf2ab9abc16479122b2b0fee5dc.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c1ed69b7768b654b2eb8e295a383535414afaaf2ab9abc16479122b2b0fee5dc.exe
Resource
win10v2004-20220812-en
General
-
Target
c1ed69b7768b654b2eb8e295a383535414afaaf2ab9abc16479122b2b0fee5dc
-
Size
13KB
-
MD5
2741983106d48706c3dc2e3d6b681618
-
SHA1
c90d0ad2cea5144b4026068a5cab1e60b80314ee
-
SHA256
c1ed69b7768b654b2eb8e295a383535414afaaf2ab9abc16479122b2b0fee5dc
-
SHA512
892e49a8c285d02ffb5ec6a71a2ecaa50abcd18113353b8b5a682653881862139ef60391fefb7e765cd23cd40ef10f4baf4e1e98f0a844dd07b32b50dc13bb3a
-
SSDEEP
192:CFxzLRhI8dQzI3wxADwQ5s4Y1Uf08TXtNzcJajvo4AbvzJQhbjpBS1mbDAVlDRh:UzLvrT9wnFZ2bcgvU2
Malware Config
Signatures
Files
-
c1ed69b7768b654b2eb8e295a383535414afaaf2ab9abc16479122b2b0fee5dc.exe windows x86
2e8978f1dab9e0db20038cce5722dec6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
CloseHandle
GetFileSize
WriteFile
CreateFileA
DeleteFileA
FreeLibrary
GetLastError
lstrcatA
WaitForSingleObject
CreateThread
WinExec
CreateMutexA
GetVersionExA
lstrcmpiA
SetFileAttributesA
GetTickCount
ReadFile
SetFilePointer
CopyFileA
LoadLibraryA
GetProcAddress
GetCurrentProcess
Sleep
OutputDebugStringA
user32
ShowWindow
GetWindowLongA
FindWindowA
wsprintfA
advapi32
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegSetValueExA
RegCreateKeyA
AdjustTokenPrivileges
wininet
DeleteUrlCacheEntry
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@XZ
?open@?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAEPAV12@PBDH@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_ifstream@DU?$char_traits@D@std@@@std@@UAE@XZ
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?close@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?getline@std@@YAAAV?$basic_istream@DU?$char_traits@D@std@@@1@AAV21@AAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
shell32
ShellExecuteA
msvcrt
malloc
_onexit
__dllonexit
_except_handler3
fopen
fwrite
fclose
fread
atoi
__CxxFrameHandler
time
localtime
strlen
memcpy
memset
_itoa
strchr
strcpy
sprintf
strcat
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE