Static task
static1
Behavioral task
behavioral1
Sample
c015363805033a22f37c3afe177268fe5643d8ed4ea11d0943847d6284ccdcf4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c015363805033a22f37c3afe177268fe5643d8ed4ea11d0943847d6284ccdcf4.exe
Resource
win10v2004-20220812-en
General
-
Target
c015363805033a22f37c3afe177268fe5643d8ed4ea11d0943847d6284ccdcf4
-
Size
381KB
-
MD5
b6aeec09ffcdb805d22ab63b15a6a77e
-
SHA1
176c959571221cfba041c169ed39cbd7d0ad8850
-
SHA256
c015363805033a22f37c3afe177268fe5643d8ed4ea11d0943847d6284ccdcf4
-
SHA512
89c6cab8eb3dabca3e90ce57ed455e930c53b7edf3235f851f4c9687ae0690b0209ff6cbb97c13778bed058bba9d94b1340a4c919ff27aa1375aa6259f99cc64
-
SSDEEP
6144:thKTz1RMjt0HEAT1fxhcMxW2pL7lv6w2K/PkFtR6sFHYnHFWhTyHVEOSQTQiJY7:nGZRM+HEAJLjpFv6w2K/PkFtlVMHFWgC
Malware Config
Signatures
Files
-
c015363805033a22f37c3afe177268fe5643d8ed4ea11d0943847d6284ccdcf4.exe windows x86
7702f1327c6a30a96103f0d01f3209b6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileTime
GetCurrentProcessId
IsBadStringPtrW
CloseHandle
LoadLibraryW
GetDriveTypeA
FindClose
CreateEventW
GetCurrentThreadId
GetPrivateProfileStringA
WriteFile
InitializeCriticalSection
ReleaseMutex
GlobalFlags
ReleaseMutex
TlsGetValue
HeapCreate
lstrlenW
GetEnvironmentVariableW
LocalFree
user32
SetFocus
GetSysColor
GetKeyboardType
IsWindow
GetClassInfoA
DrawStateW
DrawTextA
GetClientRect
EndDialog
GetSysColor
CallWindowProcW
DispatchMessageA
CreateWindowExA
pnrpnsp
NSPStartup
NSPStartup
NSPStartup
NSPStartup
NSPStartup
advapi32
InitializeSid
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 371KB - Virtual size: 370KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ