Static task
static1
Behavioral task
behavioral1
Sample
c261f03c807ea74630a37026995dca6258cdc338e8d171775d298b3a435bab28.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c261f03c807ea74630a37026995dca6258cdc338e8d171775d298b3a435bab28.exe
Resource
win10v2004-20220901-en
General
-
Target
c261f03c807ea74630a37026995dca6258cdc338e8d171775d298b3a435bab28
-
Size
136KB
-
MD5
33e786539a3e805b7623ccb26847cae3
-
SHA1
4619b5f7876f6a214a1f3e5d0b2dbccddd3e6350
-
SHA256
c261f03c807ea74630a37026995dca6258cdc338e8d171775d298b3a435bab28
-
SHA512
fbc9a97835006135b7efa6190e90bfe800788f668437d1578343def96d89d22a9969a79f85ce805f2f8cef4949b1618d4b930785b3caca9a661a74372929ed96
-
SSDEEP
3072:8Y+KjIH5Xl0iQx5QW8dKLVwRZojCAISg0D1il:VPiieSCAIzC
Malware Config
Signatures
Files
-
c261f03c807ea74630a37026995dca6258cdc338e8d171775d298b3a435bab28.exe windows x86
64f393696256249c97d197b6b7c58c96
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
FindNextFileA
FindClose
FreeLibrary
LocalFree
GetVersionExA
MapViewOfFile
UnmapViewOfFile
ExitProcess
CreateFileA
SystemTimeToFileTime
SetFileTime
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
OpenProcess
FreeEnvironmentStringsA
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsBadCodePtr
FlushFileBuffers
SetStdHandle
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetCPInfo
CopyFileA
GetModuleFileNameA
Sleep
DeleteFileA
GetProcAddress
LoadLibraryA
GetLastError
WideCharToMultiByte
InterlockedDecrement
CreateMutexA
CloseHandle
ReleaseMutex
FormatMessageA
GetEnvironmentStrings
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
VirtualQuery
UnhandledExceptionFilter
GetStdHandle
InterlockedExchange
IsBadWritePtr
VirtualAlloc
WriteFile
SetFilePointer
ReadFile
GetTimeZoneInformation
LCMapStringW
LCMapStringA
VirtualFree
HeapCreate
HeapSize
GetCurrentProcess
MultiByteToWideChar
lstrlenA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetSystemTimeAsFileTime
IsBadReadPtr
HeapFree
HeapAlloc
RtlUnwind
RaiseException
HeapReAlloc
TerminateProcess
HeapDestroy
user32
DispatchMessageA
RegisterClassExA
CreateWindowExA
MessageBoxA
ShowWindow
TranslateMessage
UpdateWindow
BeginPaint
PostQuitMessage
PostMessageA
SetTimer
GetMessageA
SetWindowTextA
GetWindowThreadProcessId
EnumWindows
EnumChildWindows
EndPaint
GetClassNameA
FindWindowA
DefWindowProcA
TranslateAcceleratorA
advapi32
RegEnumValueA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegQueryInfoKeyA
RegOpenKeyExA
RegCloseKey
SetSecurityInfo
SetEntriesInAclA
GetSecurityInfo
shell32
ShellExecuteA
ole32
CoCreateInstance
CoCreateGuid
CoInitializeEx
oleaut32
SysFreeString
SysAllocString
VariantClear
userenv
GetProfilesDirectoryA
urlmon
CreateURLMoniker
wininet
InternetCloseHandle
InternetReadFile
InternetOpenA
InternetSetOptionA
InternetOpenUrlA
HttpQueryInfoA
netapi32
Netbios
Sections
.text Size: 96KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ