Static task
static1
Behavioral task
behavioral1
Sample
cc847e057c8a19caf0afe96e27d59e51e46909edeb2f1a70371584b359f04324.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cc847e057c8a19caf0afe96e27d59e51e46909edeb2f1a70371584b359f04324.exe
Resource
win10v2004-20221111-en
General
-
Target
cc847e057c8a19caf0afe96e27d59e51e46909edeb2f1a70371584b359f04324
-
Size
305KB
-
MD5
7752189ae3f87ce9a5064c476b76aa1b
-
SHA1
79d0993809f40d2515ee5faa1a0243a1b7caa171
-
SHA256
cc847e057c8a19caf0afe96e27d59e51e46909edeb2f1a70371584b359f04324
-
SHA512
f95b190e5f2c3419c87e43dae879f650f0c583fa39919695736df2bd20ca4044b6119ecaa92ee1b544d1caa8b138438ed066a6e277bf6817bbc3664cc3c8dcb4
-
SSDEEP
6144:OZmhgGTPi6goBOU0XuS4rmYtEzKCTZZhWkdLSWDez:Oghgb6gQMlmEzl5WkRSW6z
Malware Config
Signatures
Files
-
cc847e057c8a19caf0afe96e27d59e51e46909edeb2f1a70371584b359f04324.exe windows x86
7bcdf615bd31f2b60a3b04bae68ab805
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
FindAtomA
LoadLibraryW
CreateEventW
IsBadStringPtrW
WriteFile
GetCurrentThreadId
GetFileTime
GetCurrentProcessId
ReleaseMutex
FindClose
GlobalFlags
TlsGetValue
ReleaseMutex
HeapCreate
GetDriveTypeA
lstrlenW
GetPrivateProfileStringA
GetEnvironmentVariableW
InitializeCriticalSection
user32
DrawTextA
SetFocus
GetKeyboardType
GetClassInfoA
GetSysColor
CallWindowProcW
DrawStateW
GetClientRect
DispatchMessageA
GetSysColor
CreateWindowExA
EndDialog
IsWindow
rastapi
DeviceDone
DeviceDone
DeviceDone
DeviceDone
DeviceDone
advapi32
InitializeSid
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ