Static task
static1
Behavioral task
behavioral1
Sample
c2212a910abbbf339964fa9a3a6514f7e71df63a2c154faa4396b318d2d7f035.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c2212a910abbbf339964fa9a3a6514f7e71df63a2c154faa4396b318d2d7f035.exe
Resource
win10v2004-20220812-en
General
-
Target
c2212a910abbbf339964fa9a3a6514f7e71df63a2c154faa4396b318d2d7f035
-
Size
75KB
-
MD5
be900e7242f70c773ef98a1cd5b159a2
-
SHA1
1f121d3add1a6d5ad56c02d8e8a87dbb20671a0f
-
SHA256
c2212a910abbbf339964fa9a3a6514f7e71df63a2c154faa4396b318d2d7f035
-
SHA512
8026a9d1ba5a6a20b2c730ff6996e808bd538ce6ff0c47dc60e6ea75f760ddd2f23bd81519ac04de9107053e4d478c7c5ec96c6f81e80b05f887ce5c16c8f9ac
-
SSDEEP
1536:Bw05ug/vf/u1DsB3yq19+XjzU3dk+bffJ8YyDtQP:Bw2x/uVAv+z4N1XJDyxQP
Malware Config
Signatures
Files
-
c2212a910abbbf339964fa9a3a6514f7e71df63a2c154faa4396b318d2d7f035.exe windows x86
c364f500de3035af4fa1ce4c94058182
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RaiseException
lstrcpyA
GetCurrentDirectoryA
FreeEnvironmentStringsA
lstrcpynA
CreateProcessW
lstrcmpiA
IsDebuggerPresent
GetTempPathA
LocalAlloc
CreateDirectoryA
GetLocalTime
RtlMoveMemory
SetThreadLocale
InterlockedCompareExchange
GlobalReAlloc
SizeofResource
GetCPInfo
GetCurrentThread
InterlockedExchange
GetProcAddress
LoadResource
GetThreadLocale
CopyFileA
VirtualProtect
WaitForMultipleObjects
GetExitCodeProcess
ExpandEnvironmentStringsA
DeleteFileA
WaitForSingleObject
GetModuleHandleA
GetSystemDirectoryA
GetDiskFreeSpaceA
msvcrt
_XcptFilter
_controlfp
__p__commode
_exit
_adjust_fdiv
_except_handler3
__p__fmode
__p___initenv
__getmainargs
__set_app_type
_initterm
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ