Static task
static1
Behavioral task
behavioral1
Sample
c0ad4b26cf304d47563cb37c66d347ad342e654a4bf6f302803b645c301e8c76.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c0ad4b26cf304d47563cb37c66d347ad342e654a4bf6f302803b645c301e8c76.exe
Resource
win10v2004-20220812-en
General
-
Target
c0ad4b26cf304d47563cb37c66d347ad342e654a4bf6f302803b645c301e8c76
-
Size
512KB
-
MD5
c56646c2fa8675fa890ab8aa60f289dc
-
SHA1
629c1a19e4ee56d840ed3d20940c7b38481e5a92
-
SHA256
c0ad4b26cf304d47563cb37c66d347ad342e654a4bf6f302803b645c301e8c76
-
SHA512
3324231bb0232728f59af2e2f30f0d0c8d6006eb97b4456d2a5156c7db131746bc6106ff5025ab1ab749916ca757f8c27aa69b94a41270a326d41ed9d5a4a846
-
SSDEEP
6144:V6UzEeMMTKT7uOZ3mo6XuRUliErkFIytkOyBMwpwCJ2ek7L0PXLd:8whOvd3mqRUliErq/dyS+J2r72
Malware Config
Signatures
Files
-
c0ad4b26cf304d47563cb37c66d347ad342e654a4bf6f302803b645c301e8c76.exe windows x86
08f9067e61f176880b16ba3970f34564
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OutputDebugStringW
GetFileAttributesA
GetBinaryTypeA
CompareStringA
EnumCalendarInfoA
SetHandleCount
MoveFileW
UnmapViewOfFile
SuspendThread
IsBadReadPtr
GetVolumeInformationW
OutputDebugStringA
GetFileType
VirtualLock
GetShortPathNameW
GenerateConsoleCtrlEvent
CloseHandle
GetTimeZoneInformation
lstrcmpiW
GetThreadContext
ConnectNamedPipe
FindFirstFileExW
LocalAlloc
CreateDirectoryA
FatalAppExitA
ReadConsoleInputW
TryEnterCriticalSection
GetTapeStatus
SetProcessWorkingSetSize
ExitThread
GetCurrentProcessId
GetNumberFormatW
DebugBreak
MoveFileExA
GetFileInformationByHandle
GetUserDefaultLangID
FindResourceExA
CreateWaitableTimerA
ScrollConsoleScreenBufferA
PrepareTape
CreateEventA
lstrcpynA
WritePrivateProfileSectionW
PulseEvent
ReadFile
GetAtomNameA
DuplicateHandle
GlobalFindAtomW
GetDateFormatA
LocalFileTimeToFileTime
PurgeComm
_llseek
GetLongPathNameA
GlobalDeleteAtom
DosDateTimeToFileTime
WritePrivateProfileStringA
GetLargestConsoleWindowSize
WriteConsoleOutputCharacterA
VirtualQueryEx
AreFileApisANSI
GetProfileIntA
CreatePipe
ReadDirectoryChangesW
VirtualProtect
IsProcessorFeaturePresent
QueryDosDeviceW
GetHandleInformation
IsBadWritePtr
CreateProcessA
ReleaseMutex
QueryDosDeviceA
SetConsoleWindowInfo
WritePrivateProfileStringW
GetStringTypeExW
GetOEMCP
AllocConsole
GetDriveTypeA
SearchPathW
EnumTimeFormatsW
LeaveCriticalSection
FindResourceExW
GetDriveTypeW
_lclose
GetDiskFreeSpaceW
FlushConsoleInputBuffer
FormatMessageA
GetFullPathNameA
TlsGetValue
GlobalAddAtomW
EnumResourceNamesA
PeekNamedPipe
lstrcmpiA
GetPrivateProfileStringW
GetCommandLineA
GetVersionExA
SetConsoleTitleA
ExitProcess
user32
EnableScrollBar
IsWindowEnabled
LoadCursorFromFileW
EnumThreadWindows
GrayStringW
DefFrameProcW
CharLowerBuffA
GetKeyboardLayoutNameA
GetDlgItemTextA
UpdateWindow
LoadMenuA
GetWindowWord
SetKeyboardState
SendDlgItemMessageA
gdi32
AddFontResourceA
comdlg32
ChooseFontW
advapi32
CryptSetHashParam
ObjectCloseAuditAlarmA
ControlService
ImpersonateNamedPipeClient
RegDeleteKeyA
ClearEventLogW
LockServiceDatabase
LookupAccountSidA
CryptGetProvParam
InitiateSystemShutdownA
CryptGenKey
CryptGenRandom
AddAce
GetServiceDisplayNameW
AddAccessDeniedAce
EnumDependentServicesW
StartServiceA
GetTokenInformation
SetFileSecurityW
LogonUserW
ChangeServiceConfigA
RegUnLoadKeyA
CryptSignHashW
SetTokenInformation
SetPrivateObjectSecurity
SetNamedSecurityInfoW
IsTextUnicode
RegEnumValueW
shell32
SHGetSettings
SHGetDesktopFolder
oleaut32
SysAllocStringLen
comctl32
ImageList_Draw
setupapi
SetupGetLineCountA
SetupPromptReboot
SetupCloseFileQueue
SetupDiGetClassDescriptionExA
SetupDiOpenDeviceInterfaceW
Sections
.text Size: 312KB - Virtual size: 311KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE