Static task
static1
Behavioral task
behavioral1
Sample
c0e6d955d6458ac6280873da1666576737793a2202f98647b58870021224d64a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c0e6d955d6458ac6280873da1666576737793a2202f98647b58870021224d64a.exe
Resource
win10v2004-20221111-en
General
-
Target
c0e6d955d6458ac6280873da1666576737793a2202f98647b58870021224d64a
-
Size
384KB
-
MD5
c36c8d0fdf491b0e4003eff10140a272
-
SHA1
740bc1eb5c1752ccd447d0742dab519f5f4c7aa7
-
SHA256
c0e6d955d6458ac6280873da1666576737793a2202f98647b58870021224d64a
-
SHA512
9e17dbc27e63f8a3bdaabaf38d154462d668f6c614dcba1840e4479d115c658ce2b2f032ec770cc78ab39ff1485eb59dff09206f5190cb5b5709a4869125a8da
-
SSDEEP
6144:kjLsYybnps4zSZA7B89zaCcQ706/oJEgEfUKDEFqvOEzQvmAxo6yM45dSFx:kjw7npPzSZC8frtAqfJDEcvOeanxog4m
Malware Config
Signatures
Files
-
c0e6d955d6458ac6280873da1666576737793a2202f98647b58870021224d64a.exe windows x86
77fd3febf4016747857e2a0415cc10e0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileA
GetCurrentThreadId
TerminateThread
InterlockedExchange
DeleteTimerQueue
lstrcatA
GetProcAddress
GetModuleHandleA
GetLastError
HeapFree
HeapAlloc
GlobalLock
VirtualProtectEx
IsBadCodePtr
CreateEventA
ReleaseMutex
GetSystemInfo
CloseHandle
UnlockFile
WriteFile
LockFile
SetFilePointer
ReadFile
CreateFileA
VirtualQuery
HeapCreate
GetProcessHeap
GetSystemTime
EnterCriticalSection
ReleaseSemaphore
VirtualLock
VirtualProtect
RtlUnwind
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
TerminateProcess
GetCurrentProcess
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
SetLastError
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
VirtualFree
LeaveCriticalSection
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
VirtualAlloc
HeapReAlloc
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
user32
BeginPaint
EnumChildWindows
PostQuitMessage
wsprintfA
gdi32
CreateBrushIndirect
FloodFill
advapi32
ConvertSidToStringSidW
ConvertStringSidToSidW
psapi
GetModuleBaseNameA
msvfw32
DrawDibTime
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 160KB - Virtual size: 562KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 116KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ