Static task
static1
Behavioral task
behavioral1
Sample
c554059ffc608403a3976b5de4191ac47714a515accf8eb7a22072290a8ce014.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c554059ffc608403a3976b5de4191ac47714a515accf8eb7a22072290a8ce014.exe
Resource
win10v2004-20220812-en
General
-
Target
c554059ffc608403a3976b5de4191ac47714a515accf8eb7a22072290a8ce014
-
Size
248KB
-
MD5
c1e048b62acce67ef3c3b3e11935b6b8
-
SHA1
488ef5f7178fc892b4688ea1842d3420170d54c4
-
SHA256
c554059ffc608403a3976b5de4191ac47714a515accf8eb7a22072290a8ce014
-
SHA512
6cf5cbbe2e7dcdd0aa0420f33fb0f63690021b9d6aa7a2ff62d88bdc197bc4e4c73594a9bdbe606999945d9876fc991d72789730beb59b9c2a965bbc36b0b219
-
SSDEEP
6144:D9NfOPwve134F0LloHEcwFzXitv28YAZYI7uDVMi1qRTnbp:D9N2oG33mRwFrqvqH7ERTt
Malware Config
Signatures
Files
-
c554059ffc608403a3976b5de4191ac47714a515accf8eb7a22072290a8ce014.exe windows x86
442106497131d511d03c4c8c01158cd0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoCreateInstance
gdi32
CreatePen
GetDeviceCaps
CreateSolidBrush
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
user32
GetDoubleClickTime
SystemParametersInfoA
EqualRect
ReleaseDC
GetSystemMetrics
LoadCursorA
GetDC
IsCharAlphaNumericA
GetSysColor
CharNextW
oleaut32
VariantInit
RegisterTypeLi
SysStringByteLen
SysAllocString
UnRegisterTypeLi
SysFreeString
SysStringLen
SysAllocStringByteLen
SysAllocStringLen
VariantChangeType
VariantClear
VarBstrCat
VarBstrCmp
shlwapi
PathStripToRootW
PathRemoveFileSpecW
PathIsRelativeW
PathCanonicalizeW
PathIsURLW
PathRenameExtensionW
PathFileExistsW
kernel32
ReleaseMutex
EnterCriticalSection
SetUnhandledExceptionFilter
HeapDestroy
InitializeCriticalSectionAndSpinCount
LocalFree
CloseHandle
GetSystemTimeAsFileTime
IsDBCSLeadByte
DeleteFileW
FindResourceExW
lstrlenA
GetFullPathNameA
LeaveCriticalSection
IsDebuggerPresent
GetCurrentDirectoryW
GetModuleHandleW
FindFirstFileA
GetModuleHandleA
GetProcessHeap
lstrlenW
GetCurrentDirectoryA
GetUserDefaultLangID
GetFullPathNameW
LockResource
LocalAlloc
WaitForSingleObject
HeapSize
LoadResource
FindClose
HeapReAlloc
HeapFree
RaiseException
DeleteCriticalSection
UnhandledExceptionFilter
DeleteFileA
GetCurrentThreadId
CreateMutexA
FindResourceW
SizeofResource
CopyFileW
IsProcessorFeaturePresent
HeapAlloc
GetStartupInfoA
VirtualAllocEx
lstrcmpA
security
ExportSecurityContext
ImportSecurityContextW
ImportSecurityContextA
QuerySecurityPackageInfoA
ntlanui2
DllCanUnloadNow
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 219KB - Virtual size: 221KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ