Static task
static1
Behavioral task
behavioral1
Sample
c1c89e8666c8db2f1fe615868465d6a1f83d71e8138b4dbe4f7258e520337948.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c1c89e8666c8db2f1fe615868465d6a1f83d71e8138b4dbe4f7258e520337948.exe
Resource
win10v2004-20220812-en
General
-
Target
c1c89e8666c8db2f1fe615868465d6a1f83d71e8138b4dbe4f7258e520337948
-
Size
820KB
-
MD5
08e821e4c9cca60d66458067c2558760
-
SHA1
9a34722fdeaff810047fe70f5096689a85275599
-
SHA256
c1c89e8666c8db2f1fe615868465d6a1f83d71e8138b4dbe4f7258e520337948
-
SHA512
5c35524497808d819ff23c67feb74c20d5c54832f3522919b2436f9fdb07913e40367096b727383559574f48c7d45c15c2c2587b94d4a9669d1b67f69f6f751b
-
SSDEEP
24576:ylBWQGEX3nLdZpOqU/SD0MVlzeSMBtUmzGQLl:WDLdZ4n/FeehjUmaQLl
Malware Config
Signatures
Files
-
c1c89e8666c8db2f1fe615868465d6a1f83d71e8138b4dbe4f7258e520337948.exe windows x86
2c9a0e78eed76f14c9182e5b14df4b7a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetEnvironmentStrings
CompareStringA
FlushFileBuffers
RtlUnwind
GetSystemInfo
VirtualAlloc
GetConsoleMode
InterlockedExchange
HeapAlloc
GlobalFlags
LocalAlloc
FindClose
HeapSize
GetVersionExA
IsDebuggerPresent
LoadResource
GetCurrentThreadId
ReadFile
GlobalAlloc
Sleep
GetModuleFileNameA
lstrlenA
TlsFree
VirtualProtect
GetCommandLineA
GlobalHandle
GetStartupInfoA
SetStdHandle
SetEnvironmentVariableA
GetCurrentThread
LockFile
GetFileSize
LocalFree
GetSystemTimeAsFileTime
GetFileTime
GetCommandLineW
WriteConsoleA
VirtualFree
GlobalLock
GetACP
GetThreadLocale
CloseHandle
LockResource
lstrcmpA
SetHandleCount
GetFileType
SizeofResource
DeleteCriticalSection
HeapFree
SetLastError
MulDiv
GetConsoleCP
LocalReAlloc
HeapCreate
GetLastError
TlsAlloc
SetFilePointer
QueryPerformanceCounter
GetWindowsDirectoryA
FreeResource
FileTimeToSystemTime
GetStringTypeA
GetProcessHeap
GetLocaleInfoA
LeaveCriticalSection
WriteFile
FileTimeToLocalFileTime
LocalFileTimeToFileTime
SetErrorMode
RaiseException
FreeEnvironmentStringsA
InterlockedDecrement
HeapReAlloc
EnterCriticalSection
VirtualQuery
GlobalUnlock
InterlockedIncrement
DuplicateHandle
GetStdHandle
GetTimeZoneInformation
GetOEMCP
TlsGetValue
SetFileTime
GlobalDeleteAtom
UnlockFile
InitializeCriticalSection
UnhandledExceptionFilter
TerminateProcess
FreeLibrary
ConvertDefaultLocale
LCMapStringA
HeapDestroy
GlobalFree
SetEndOfFile
GlobalReAlloc
GetConsoleOutputCP
SetUnhandledExceptionFilter
LoadLibraryA
EnumResourceLanguagesW
GetSystemDirectoryA
SystemTimeToFileTime
GetCurrentProcessId
GetVersion
LoadLibraryExA
GetModuleHandleA
AddAtomA
GetProcAddress
GetTickCount
TlsSetValue
ExitProcess
user32
GetLastActivePopup
GetMenu
WindowFromPoint
BeginPaint
SetScrollInfo
LockWindowUpdate
SetScrollRange
SystemParametersInfoA
SetCapture
DeferWindowPos
IsIconic
GetMessageTime
GetWindowPlacement
IsWindowVisible
GetDlgItem
SetActiveWindow
GetDCEx
GetSysColor
AdjustWindowRectEx
PostQuitMessage
ReleaseCapture
InvalidateRect
GetWindowDC
GetKeyState
BringWindowToTop
UnpackDDElParam
UnhookWindowsHookEx
GetMenuItemCount
EndDeferWindowPos
EnableMenuItem
IntersectRect
KillTimer
GetNextDlgTabItem
ShowScrollBar
GetMenuState
GetSystemMetrics
ReleaseDC
ClientToScreen
SetRect
ReuseDDElParam
GetDlgCtrlID
SetForegroundWindow
ScreenToClient
TranslateMessage
DestroyIcon
EqualRect
GetNextDlgGroupItem
SendDlgItemMessageA
ScrollWindow
MapWindowPoints
CopyRect
SetFocus
GetCursorPos
ValidateRect
CreatePopupMenu
GetDC
EndPaint
MapDialogRect
DrawIcon
SetMenu
IsWindow
SetWindowContextHelpId
SetTimer
ShowWindow
SetRectEmpty
PtInRect
GetScrollInfo
GetMessagePos
SetParent
IsWindowEnabled
OffsetRect
GetWindowRect
TrackPopupMenu
InvalidateRgn
GetSystemMenu
SetWindowRgn
SetWindowPos
GetWindowRgn
GetScrollPos
DeleteMenu
GetFocus
UpdateWindow
InflateRect
GetCapture
SetScrollPos
DestroyMenu
IsChild
SetCursor
MessageBeep
GetMenuCheckMarkDimensions
MoveWindow
UnregisterClassA
SetMenuItemBitmaps
EndDialog
RedrawWindow
GetActiveWindow
GetSysColorBrush
GetMenuItemID
ShowOwnedPopups
CallNextHookEx
GetWindow
FillRect
GetForegroundWindow
DestroyWindow
GetTopWindow
GetDesktopWindow
GetScrollRange
BeginDeferWindowPos
GetParent
IsRectEmpty
GetClientRect
GetSubMenu
GetWindowThreadProcessId
CheckMenuItem
IsZoomed
gdi32
SetViewportExtEx
CreatePatternBrush
CreateRectRgn
SelectObject
SetBkMode
DeleteObject
SetRectRgn
ExtSelectClipRgn
DeleteDC
StretchDIBits
SetTextColor
SaveDC
CreateCompatibleDC
PatBlt
SelectClipRgn
GetPixel
OffsetViewportOrgEx
GetDeviceCaps
GetWindowExtEx
IntersectClipRect
ExcludeClipRect
BitBlt
GetRgnBox
CreateSolidBrush
GetMapMode
Ellipse
CreateEllipticRgn
SetMapMode
CreateCompatibleBitmap
ScaleWindowExtEx
OffsetRgn
GetTextColor
ScaleViewportExtEx
SetWindowExtEx
PtVisible
RestoreDC
GetClipBox
RectVisible
CombineRgn
GetStockObject
SetViewportOrgEx
CreateRectRgnIndirect
GetBkColor
SetBkColor
DPtoLP
Escape
CreateBitmap
advapi32
SetFileSecurityW
RegCloseKey
shell32
DragAcceptFiles
DragFinish
ole32
CoRevokeClassObject
CoRegisterMessageFilter
CreateStreamOnHGlobal
CreateILockBytesOnHGlobal
CoCreateInstance
OleInitialize
CLSIDFromString
StgCreateDocfileOnILockBytes
OleIsCurrentClipboard
CoFreeUnusedLibraries
OleUninitialize
CLSIDFromProgID
CoTaskMemFree
StgOpenStorageOnILockBytes
CoTaskMemAlloc
OleFlushClipboard
CoGetClassObject
oleaut32
VariantChangeType
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SysAllocStringLen
SysStringLen
SysFreeString
VariantClear
VariantCopy
VariantInit
SysAllocString
SafeArrayDestroy
OleLoadPicture
comctl32
ImageList_LoadImageW
shlwapi
PathFindExtensionW
PathFileExistsW
PathRemoveExtensionW
PathFindFileNameW
PathIsUNCW
PathStripToRootW
Sections
.text Size: 554KB - Virtual size: 554KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 153KB - Virtual size: 5.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 101B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ