Static task
static1
Behavioral task
behavioral1
Sample
c53e70a9076677218f75f09fa1b594a06feb8b5b44a5f3305a785214a09c7999.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c53e70a9076677218f75f09fa1b594a06feb8b5b44a5f3305a785214a09c7999.exe
Resource
win10v2004-20221111-en
General
-
Target
c53e70a9076677218f75f09fa1b594a06feb8b5b44a5f3305a785214a09c7999
-
Size
96KB
-
MD5
3f5be36ba764f0c3b91773b1b4e4d47d
-
SHA1
8311a0440981649d2d89c3fd12c096c7fbd655ad
-
SHA256
c53e70a9076677218f75f09fa1b594a06feb8b5b44a5f3305a785214a09c7999
-
SHA512
2571b44bf8daa5ae4dc9f0cdab07f51bff7a6cadfd1d2032e188989311260ed5f22fff8558bebeafcd4f8c8c5aa104b9f1556db8bb60456c8c0fad217d371896
-
SSDEEP
1536:9o8YzaoQA0i82T/DbntbY8hgrk2D/oSUmpsLiaDpe/oIeWbLJWybLO8yaj:czaoQO82T/3tIrk6/oSUuawojSLJJ9ys
Malware Config
Signatures
Files
-
c53e70a9076677218f75f09fa1b594a06feb8b5b44a5f3305a785214a09c7999.exe windows x86
4a6d11767ac71fa67758e4b6570726cd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
crtdll
memset
strlen
_strnicmp
strncmp
strncpy
strcpy
strcat
localtime
mktime
gmtime
sprintf
user32
wsprintfA
wvsprintfA
MessageBoxA
GetWindowThreadProcessId
IsWindowVisible
IsWindowEnabled
GetForegroundWindow
EnableWindow
EnumWindows
advapi32
RegOpenKeyExA
RegConnectRegistryA
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegEnumValueA
RegCreateKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
oleaut32
SysAllocStringLen
ole32
CoInitialize
CoCreateInstance
CoUninitialize
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
urlmon
URLDownloadToFileA
comctl32
InitCommonControls
kernel32
GetModuleHandleA
GetCommandLineA
ExitProcess
HeapCreate
GetModuleFileNameA
GetVersion
GetSystemDirectoryA
CreateFileA
SetFileTime
CloseHandle
GetFileTime
HeapDestroy
HeapReAlloc
FreeLibrary
GetProcAddress
HeapAlloc
LoadLibraryA
IsBadReadPtr
HeapFree
MultiByteToWideChar
WideCharToMultiByte
SetUnhandledExceptionFilter
GetVersionExA
GetCurrentDirectoryA
GlobalAlloc
OpenProcess
GetLastError
FormatMessageA
TerminateProcess
GlobalFree
GetCurrentProcess
GetCurrentThreadId
GetCurrentProcessId
WaitForSingleObject
Sleep
GetTickCount
GetDriveTypeA
FindFirstFileA
FindClose
FindNextFileA
DeleteFileA
CopyFileA
MoveFileA
ReadFile
SetFilePointer
GetFileSize
WriteFile
GetLocalTime
shell32
ShellExecuteExA
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.flat Size: 1024B - Virtual size: 617B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE