Static task
static1
Behavioral task
behavioral1
Sample
c55f4b4129ea94bbc22d76a7abb18fdbb3dbd17bbea075bcf54eb7fd683fd53a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c55f4b4129ea94bbc22d76a7abb18fdbb3dbd17bbea075bcf54eb7fd683fd53a.exe
Resource
win10v2004-20220901-en
General
-
Target
c55f4b4129ea94bbc22d76a7abb18fdbb3dbd17bbea075bcf54eb7fd683fd53a
-
Size
38KB
-
MD5
bcdc32978df9a7786c2c52a48aed57b7
-
SHA1
5c5457afc915f8e14d33ed6affd55b89f78f6ae5
-
SHA256
c55f4b4129ea94bbc22d76a7abb18fdbb3dbd17bbea075bcf54eb7fd683fd53a
-
SHA512
6db289eab0d65772e768b33b3ed3a263b78e68f309d967ed0777a1c54c59bd59d1f0a3e4b076484a576d77f3c35452132ebd65f0584c8831a5b9d955327c13d2
-
SSDEEP
768:k9Y0siEJa1gyaXWnDa4UBI+2ROLZ9VRmhAMf:R0sFpy/DaVPtml
Malware Config
Signatures
Files
-
c55f4b4129ea94bbc22d76a7abb18fdbb3dbd17bbea075bcf54eb7fd683fd53a.exe windows x86
604be99d8d0318c871d669a729de85d9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GdiEntry3
GetRelAbs
WidenPath
SetWorldTransform
GdiQueryFonts
CreateEnhMetaFileA
EnumObjects
EndPath
DdEntry19
SetColorSpace
SetTextAlign
SetDCPenColor
AngleArc
EngQueryEMFInfo
StartPage
CreateDIBitmap
GetWinMetaFileBits
GdiDrawStream
GetTextExtentExPointW
GetArcDirection
DdEntry28
GdiArtificialDecrementDriver
EngStretchBlt
CreateRoundRectRgn
GdiAddGlsRecord
BRUSHOBJ_pvAllocRbrush
EngComputeGlyphSet
ScaleViewportExtEx
CreateScalableFontResourceA
msvcrt
__p__wcmdln
_getdrive
_stati64
exit
_getw
_wfindnext
wscanf
_mbscmp
wcslen
_heapchk
putwc
isspace
__p__commode
_ismbcalnum
_sopen
_unloaddll
wcsspn
_aligned_offset_realloc
_wctime
_mbsnbcat
__getmainargs
_wspawnvp
__CxxCallUnwindDtor
_execvp
_ismbbkalnum
__set_app_type
_vscwprintf
_getwch
_wpgmptr
atan2
remove
putwchar
wtsapi32
WTSQuerySessionInformationA
WTSVirtualChannelPurgeOutput
WTSOpenServerA
WTSUnRegisterSessionNotification
WTSVirtualChannelRead
WTSSetSessionInformationA
WTSEnumerateServersA
WTSVirtualChannelPurgeInput
WTSSetSessionInformationW
WTSEnumerateProcessesW
WTSLogoffSession
WTSVirtualChannelWrite
WTSEnumerateSessionsW
shell32
ExtractAssociatedIconA
InternalExtractIconListA
StrStrIW
SHPathPrepareForWriteA
Control_RunDLLW
SHGetFolderPathW
SHGetFolderLocation
SHGetSpecialFolderLocation
SHEmptyRecycleBinW
SHGetFileInfoW
SheChangeDirExW
SHCreateDirectoryExA
StrNCmpIA
DragQueryPoint
SHCreateLocalServerRunDll
SHChangeNotifySuspendResume
ExtractIconW
SHEnumerateUnreadMailAccountsW
SHGetIconOverlayIndexA
StrStrIA
SHGetSpecialFolderPathW
AppCompat_RunDLLW
RealShellExecuteExA
SHGetFolderPathAndSubDirW
ExtractIconExW
SHGetNewLinkInfoA
ExtractAssociatedIconW
StrRStrIW
StrStrW
ShellExecuteExA
psbase
SPCreateSubtype
SPAcquireContext
SPCreateType
SPCloseItem
SPDeleteSubtype
SPSetProvParam
SPDeleteType
SPGetSubtypeInfo
SPWriteItem
SPGetTypeInfo
SPEnumSubtypes
SPDeleteItem
SPGetProvInfo
SPGetProvParam
SPOpenItem
FPasswordChangeNotify
SPEnumTypes
SPReleaseContext
SPReadItem
SPProviderInitialize
SPEnumItems
shlwapi
StrCSpnA
PathCreateFromUrlW
SHOpenRegStream2W
PathCombineW
PathStripToRootW
UrlCreateFromPathA
PathRemoveFileSpecA
PathRemoveBlanksA
PathCommonPrefixA
PathCommonPrefixW
StrCSpnW
UrlIsOpaqueW
StrCpyW
SHGetValueW
kernel32
GetPrivateProfileSectionW
GetProcessId
WaitForSingleObject
GetConsoleAliasExesW
ReplaceFileW
BaseCheckAppcompatCache
AllocateUserPhysicalPages
ExitVDM
UpdateResourceA
CreatePipe
LoadLibraryW
CreateProcessInternalA
GetEnvironmentStringsA
GetFileInformationByHandle
GetStringTypeA
SignalObjectAndWait
GetLocaleInfoA
HeapReAlloc
FlushFileBuffers
CreateSemaphoreA
GetLogicalDriveStringsA
user32
RegisterClassA
PostQuitMessage
DefWindowProcA
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ