Static task
static1
Behavioral task
behavioral1
Sample
c83de23ccf381ec2dbf6ae3994f7a551f0fbb013b7e2babf465c77b195df6d28.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c83de23ccf381ec2dbf6ae3994f7a551f0fbb013b7e2babf465c77b195df6d28.exe
Resource
win10v2004-20221111-en
General
-
Target
c83de23ccf381ec2dbf6ae3994f7a551f0fbb013b7e2babf465c77b195df6d28
-
Size
75KB
-
MD5
3c78c8d29fdf3afa64c2f2f4c4b3cc19
-
SHA1
566e20051e758b4f07ac09ce98a500887d7e0999
-
SHA256
c83de23ccf381ec2dbf6ae3994f7a551f0fbb013b7e2babf465c77b195df6d28
-
SHA512
ef36601884881b6513cb62a3d71039b0a9672b9c5102f03c5dc47cb2de7a22420d100dd5504490c35b85d9a93ab137a4076cee7cb3ebff702f0ca20273f0fe0f
-
SSDEEP
1536:zcrdMTuEzThiVu/FqTKyjW5bFVOokFGJhn4ZMSXURI:zoiuEPAs2KyWbOIhZ
Malware Config
Signatures
Files
-
c83de23ccf381ec2dbf6ae3994f7a551f0fbb013b7e2babf465c77b195df6d28.exe windows x86
b96a391e68c70a82156d8b6f0a541ae4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlDetermineDosPathNameType_U
NtQueryVirtualMemory
RtlDestroyEnvironment
RtlInitializeGenericTable
RtlxUnicodeStringToOemSize
RtlAcquireResourceExclusive
RtlDeleteElementGenericTable
RtlConvertSidToUnicodeString
RtlCompareUnicodeString
RtlValidRelativeSecurityDescriptor
RtlInsertElementGenericTable
ole32
CoReleaseMarshalData
CoUnmarshalInterface
OleUninitialize
CoMarshalInterThreadInterfaceInStream
CLSIDFromProgID
StringFromIID
OleRegEnumVerbs
PropVariantClear
CoCreateGuid
CoRevertToSelf
advapi32
RegCreateKeyW
CryptReleaseContext
CryptAcquireContextA
OpenServiceW
AllocateAndInitializeSid
SetSecurityDescriptorGroup
LsaFreeMemory
RegOpenKeyW
GetLengthSid
ConvertStringSidToSidW
IsValidSecurityDescriptor
oleaut32
GetErrorInfo
CreateErrorInfo
OleLoadPicture
SysStringByteLen
SafeArrayPutElement
SafeArrayGetElement
SysStringLen
VariantCopy
RegisterTypeLib
SafeArrayAccessData
kernel32
lstrcpyA
WriteConsoleW
LoadResource
OpenMutexA
SystemTimeToFileTime
GetTickCount
GetExitCodeProcess
GetFileAttributesA
CreateEventA
IsBadReadPtr
ExitProcess
SetEvent
HeapDestroy
FindFirstFileA
GlobalAlloc
FileTimeToSystemTime
VirtualAlloc
GetFullPathNameW
FindResourceA
GetVersionExA
GetSystemInfo
GetVersion
GetConsoleMode
GetModuleHandleW
GetDriveTypeA
user32
GetSysColor
SendDlgItemMessageW
GetParent
CheckDlgButton
GetWindowTextW
GetDlgItem
CopyRect
GetWindowTextA
MsgWaitForMultipleObjects
GetSubMenu
CharPrevW
UnregisterClassW
GetForegroundWindow
GetDC
FindWindowW
GetMenu
RegisterClassExA
SetFocus
IsIconic
OffsetRect
GetSystemMenu
GetFocus
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 56KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE