Static task
static1
Behavioral task
behavioral1
Sample
c4ae57ba3b9ce317e967fbf2c63c1674aa845273306bd09e0dca9e463d9a2759.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c4ae57ba3b9ce317e967fbf2c63c1674aa845273306bd09e0dca9e463d9a2759.exe
Resource
win10v2004-20220901-en
General
-
Target
c4ae57ba3b9ce317e967fbf2c63c1674aa845273306bd09e0dca9e463d9a2759
-
Size
40KB
-
MD5
4ff4438df9d36cf0a96c557432b50ded
-
SHA1
3216261d3d9f4336df12781f1dab6303645ad4f7
-
SHA256
c4ae57ba3b9ce317e967fbf2c63c1674aa845273306bd09e0dca9e463d9a2759
-
SHA512
7669ca364e8dbb3fccd36a71ce0b2e926ebf7a9ff295f404f9bba7011a42752ba415706529eb8680be56448561c44302d4c7c587511bc70985f06562f7fd5c1a
-
SSDEEP
768:Wd07AdXsoZZ/MY21qoMD+Wwl9rl4q0TfKLeX:WoAdXsoZ5M6DtwfpgKu
Malware Config
Signatures
Files
-
c4ae57ba3b9ce317e967fbf2c63c1674aa845273306bd09e0dca9e463d9a2759.exe windows x86
9fd0eec66d6b61dc5547a948f15dd92d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
InternetReadFile
mfc42
ord800
ord540
ord1105
ord6283
ord6282
ord6877
ord4202
ord2818
ord537
ord858
ord825
ord823
ord535
ord6930
ord941
ord354
ord801
ord6883
ord6143
ord541
ord4129
ord6928
ord4277
ord5683
ord940
ord665
ord3790
ord860
ord5861
msvcrt
puts
__CxxFrameHandler
vsprintf
memcpy
free
malloc
realloc
memset
memcmp
strcmp
_strupr
sprintf
_splitpath
strcpy
atol
_mbslwr
__dllonexit
_onexit
_except_handler3
_exit
_XcptFilter
exit
_acmdln
__set_app_type
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_controlfp
kernel32
GetStartupInfoA
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
WritePrivateProfileStringA
MoveFileExA
GetTickCount
WinExec
Sleep
DeleteFileA
GetWindowsDirectoryA
CreateDirectoryA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
GetCurrentThread
GetCurrentProcess
CloseHandle
lstrcatA
lstrcpyA
LoadLibraryA
GetProcAddress
InitializeCriticalSection
IsDBCSLeadByte
LoadLibraryExA
GetLastError
FindResourceA
LoadResource
SizeofResource
FreeLibrary
WideCharToMultiByte
GetModuleHandleA
GetShortPathNameA
GetCurrentThreadId
lstrcmpiA
GetCommandLineA
lstrlenA
GetModuleFileNameA
lstrlenW
MultiByteToWideChar
lstrcpynA
user32
SetTimer
TranslateMessage
KillTimer
MessageBoxA
LoadStringA
GetMessageA
DispatchMessageA
PostThreadMessageA
CharNextA
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegEnumValueA
RegQueryInfoKeyA
RegEnumKeyExA
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyExA
StartServiceCtrlDispatcherA
ControlService
DeleteService
CreateServiceA
ChangeServiceConfig2A
RegDeleteValueA
RegSetValueExA
RegCloseKey
RegQueryValueExA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
OpenSCManagerA
OpenServiceA
CloseServiceHandle
CopySid
GetLengthSid
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
OpenProcessToken
OpenThreadToken
GetTokenInformation
CreateProcessAsUserA
ole32
CoRegisterClassObject
CoRevokeClassObject
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoInitialize
CoInitializeSecurity
CoUninitialize
CoTaskMemFree
oleaut32
SysFreeString
SysAllocString
LoadTypeLi
RegisterTypeLi
VarUI4FromStr
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ