Static task
static1
Behavioral task
behavioral1
Sample
c8503ea84e992efd7b2cf239bfb29711960ca4a6790f5f7c6caa3f8b4ddd361e.exe
Resource
win7-20220901-en
General
-
Target
c8503ea84e992efd7b2cf239bfb29711960ca4a6790f5f7c6caa3f8b4ddd361e
-
Size
156KB
-
MD5
6f26d8d1bcee8c7575abf6723b68f5f0
-
SHA1
2aec82ccc0294a8820778b536ce526012f30da74
-
SHA256
c8503ea84e992efd7b2cf239bfb29711960ca4a6790f5f7c6caa3f8b4ddd361e
-
SHA512
7eb12f9b1f8a98ef8a1b7a44b22cd948383401d4a8ba2dd6eef666434a2a4bf8e131eef7024298ff2caa21ce2f9167ee172cfd720dc3f2600cb2ba510c3e7008
-
SSDEEP
3072:RazR/tIq/RftiMwj9KhxC9xUnGOUKdlyCX5kMPOxylt:Rat/tt1tKj9cFGOBa
Malware Config
Signatures
Files
-
c8503ea84e992efd7b2cf239bfb29711960ca4a6790f5f7c6caa3f8b4ddd361e.exe windows x86
702a573360faa7932ad2c270d58e09a1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GetCommandLineW
GetCurrentThread
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetVersion
HeapAlloc
HeapFree
InterlockedExchange
FreeLibrary
LocalAlloc
LocalFree
MultiByteToWideChar
RaiseException
SetCurrentDirectoryA
SetErrorMode
SetThreadPriority
lstrcatA
lstrcpyA
lstrlenA
lstrlenW
VirtualAlloc
FormatMessageA
ExitProcess
CreateMutexA
CompareStringA
LoadLibraryA
CloseHandle
user32
IsIconic
IsWindowVisible
MessageBoxA
SendMessageTimeoutA
SetForegroundWindow
ShowWindow
LoadIconA
LoadCursorA
LoadCursorW
RegisterClassExW
LoadIconW
GetWindow
GetParent
GetDesktopWindow
GetClassNameA
FindWindowA
GetWindowThreadProcessId
gdi32
GetStockObject
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ