Static task
static1
Behavioral task
behavioral1
Sample
c32fcaf7da46bb6c6766b50740ca57e0156b88f2e29c2b5d435f7c7121bda4f5.exe
Resource
win7-20220812-en
General
-
Target
c32fcaf7da46bb6c6766b50740ca57e0156b88f2e29c2b5d435f7c7121bda4f5
-
Size
360KB
-
MD5
b9e7ad391fb1ab6a747a0a9deeacda13
-
SHA1
4a6b03c9c1d11b82e119e4978935ba4694362996
-
SHA256
c32fcaf7da46bb6c6766b50740ca57e0156b88f2e29c2b5d435f7c7121bda4f5
-
SHA512
1c1f2844e225e6d6ebf0bfd5005988c546951537839bfb8901503fcdcbd156591d86dbc013478162a34df3d678c93f277dd7444134112a4a12cd14bad98cdc20
-
SSDEEP
6144:3jT/842Wf1mUhmKDWM3LHLf+pNwcBlvaEHXLruGe3lvuJwSrZsSbkxsxx44GjhL:v/8CdmUTWETD+BaE3Lr+lvWrZsSbkW1M
Malware Config
Signatures
Files
-
c32fcaf7da46bb6c6766b50740ca57e0156b88f2e29c2b5d435f7c7121bda4f5.exe windows x86
a264eaba87781550d69bb66cae5d3997
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
GetFullPathNameW
LoadLibraryA
DeleteFileW
HeapReAlloc
TerminateThread
EnumResourceLanguagesA
BeginUpdateResourceW
Heap32First
lstrlen
GetVolumePathNameA
Module32FirstW
CancelWaitableTimer
InterlockedFlushSList
FindAtomW
LockFile
OpenFileMappingA
LocalSize
Module32NextW
Module32First
OutputDebugStringA
VirtualAlloc
SetConsoleWindowInfo
GetFileAttributesExA
GetModuleHandleW
DeleteAtom
AddLocalAlternateComputerNameW
GetSystemWow64DirectoryA
msvcirt
?floatfield@ios@@2JB
??_Estrstreambuf@@UAEPAXI@Z
??5istream@@QAEAAV0@AAM@Z
?seekg@istream@@QAEAAV1@JW4seek_dir@ios@@@Z
??4iostream@@IAEAAV0@AAV0@@Z
?doallocate@streambuf@@MAEHXZ
?sync@strstreambuf@@UAEHXZ
??0ostrstream@@QAE@XZ
??0streambuf@@IAE@XZ
??6ostream@@QAEAAV0@PAVstreambuf@@@Z
??_Estrstream@@UAEPAXI@Z
?flags@ios@@QAEJJ@Z
?setbuf@ifstream@@QAEPAVstreambuf@@PADH@Z
?setp@streambuf@@IAEXPAD0@Z
??0fstream@@QAE@XZ
?ws@@YAAAVistream@@AAV1@@Z
??4ostream_withassign@@QAEAAV0@ABV0@@Z
?open@fstream@@QAEXPBDHH@Z
??1logic_error@@UAE@XZ
??_8iostream@@7Bostream@@@
??_Dostrstream@@QAEXXZ
user32
CharUpperBuffW
SetSysColorsTemp
CreateSystemThreads
UnionRect
IsWinEventHookInstalled
ClientThreadSetup
OpenClipboard
GetSysColorBrush
GetUpdateRgn
AppendMenuW
BroadcastSystemMessage
SetCapture
ShowOwnedPopups
GetTabbedTextExtentW
RecordShutdownReason
GetFocus
GetClipboardData
GetComboBoxInfo
GetWindowPlacement
DdeQueryNextServer
MessageBoxExA
GetMenuStringA
secur32
DeleteSecurityPackageW
SaslGetProfilePackageA
GetUserNameExA
SecpTranslateName
TranslateNameW
QuerySecurityPackageInfoW
EnumerateSecurityPackagesA
FreeCredentialsHandle
SetContextAttributesA
QueryContextAttributesW
LsaGetLogonSessionData
CredUnmarshalTargetInfo
EnumerateSecurityPackagesW
MakeSignature
AcquireCredentialsHandleA
QueryCredentialsAttributesA
GetSecurityUserInfo
ExportSecurityContext
CompleteAuthToken
Sections
.text Size: 278KB - Virtual size: 277KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 439KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ