Static task
static1
Behavioral task
behavioral1
Sample
c6bbaa884562a41656aa059ba5b2766ad0fb23ddaf10e3dc7272c6a3c75a536e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c6bbaa884562a41656aa059ba5b2766ad0fb23ddaf10e3dc7272c6a3c75a536e.exe
Resource
win10v2004-20221111-en
General
-
Target
c6bbaa884562a41656aa059ba5b2766ad0fb23ddaf10e3dc7272c6a3c75a536e
-
Size
107KB
-
MD5
3f08d83feb8cb2b89b3c37783089b2c0
-
SHA1
948bff0e61974718d15ae8de547f3c71ffef253f
-
SHA256
c6bbaa884562a41656aa059ba5b2766ad0fb23ddaf10e3dc7272c6a3c75a536e
-
SHA512
87f8b4f1d1e099660a660b8d92218a03366f78108eff6dd7522899fa4bf89bd3da75f2394338474dfcc3c11d3caee939c0654c85aefb2acf872decc286145874
-
SSDEEP
1536:1zo5xeVGBABDIiKP8T+//keWTssqiC0+Z89mLWCWjHneLF7UaWrEhHCIwGFPWD6R:1Eq8eDjKP95WYsCO9mq7HnONfFPWGR
Malware Config
Signatures
Files
-
c6bbaa884562a41656aa059ba5b2766ad0fb23ddaf10e3dc7272c6a3c75a536e.exe windows x86
67c43620fda4309cb034e897d2f001a1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetVersion
ExitProcess
GetTempPathA
GetCommandLineA
SetUnhandledExceptionFilter
GetFileAttributesW
GetThreadLocale
GetUserDefaultLangID
GetEnvironmentStringsW
GetDiskFreeSpaceA
InterlockedExchange
CompareStringA
GlobalLock
GetTempPathW
GetCPInfo
OutputDebugStringA
VirtualProtect
IsDebuggerPresent
GetConsoleMode
MoveFileA
GetTimeZoneInformation
DuplicateHandle
GetSystemDefaultLCID
DeviceIoControl
GetVersionExW
GetStartupInfoA
SetFilePointer
lstrlenA
LocalFree
GetACP
SetFileAttributesA
FileTimeToLocalFileTime
GetStartupInfoW
GetModuleHandleW
GetDriveTypeA
Sleep
CopyFileA
UnhandledExceptionFilter
GlobalAlloc
GetEnvironmentStrings
LocalAlloc
IsBadWritePtr
GetSystemTime
DeleteFileA
QueryPerformanceCounter
GetExitCodeProcess
GetConsoleOutputCP
lstrcmpiA
FileTimeToSystemTime
lstrcpyA
GetOEMCP
GetModuleHandleA
GlobalReAlloc
SetThreadLocale
LoadResource
msvcrt
__p__fmode
__set_app_type
_exit
__p___initenv
__p__commode
_controlfp
__setusermatherr
_initterm
_except_handler3
_XcptFilter
__getmainargs
_adjust_fdiv
advapi32
OpenSCManagerA
RegSetValueExW
RegDeleteValueW
RegFlushKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
CryptHashData
RegEnumValueA
RegOpenKeyExW
RevertToSelf
RegEnumKeyExA
RegCreateKeyExW
InitializeAcl
OpenServiceA
RegQueryInfoKeyW
RegEnumKeyA
GetLengthSid
RegCreateKeyExA
OpenThreadToken
CryptCreateHash
SetSecurityDescriptorOwner
RegDeleteKeyA
DeregisterEventSource
CheckTokenMembership
OpenSCManagerW
DeleteService
RegQueryInfoKeyA
user32
SetScrollInfo
RegisterClipboardFormatA
SendDlgItemMessageA
RedrawWindow
CallWindowProcA
SetWindowTextA
IsChild
GetWindowTextA
GetSubMenu
WaitMessage
EndPaint
GetWindowRect
WindowFromPoint
BeginPaint
SystemParametersInfoA
LoadCursorA
RemoveMenu
GetKeyboardType
ClientToScreen
DestroyIcon
DrawIconEx
GetScrollRange
GetMessageA
GetMenuStringA
DestroyMenu
OemToCharA
UnregisterClassA
GetPropA
GetClientRect
DispatchMessageA
IsWindow
GetScrollPos
GetClassNameA
GetSysColor
PeekMessageA
InsertMenuA
DialogBoxParamA
IsWindowEnabled
ReleaseCapture
DestroyWindow
DeleteMenu
CheckMenuItem
Sections
.text Size: 1024B - Virtual size: 828B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ