Static task
static1
Behavioral task
behavioral1
Sample
c53efdd13915436ec91b1ce69781ec241375939a01c7fd3dcb9552a7512161e3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c53efdd13915436ec91b1ce69781ec241375939a01c7fd3dcb9552a7512161e3.exe
Resource
win10v2004-20220901-en
General
-
Target
c53efdd13915436ec91b1ce69781ec241375939a01c7fd3dcb9552a7512161e3
-
Size
26KB
-
MD5
e2b419c37938f8ba129045610c7af94f
-
SHA1
877934dd84cea1aefc280a0f6db87672229fb9f2
-
SHA256
c53efdd13915436ec91b1ce69781ec241375939a01c7fd3dcb9552a7512161e3
-
SHA512
7138f5ed730c98bb436cc24c1b556c410c9ae77bf17a4dfee9f8245ee7d12bc44ad2ef3a1eb130afbac3dc2202fc82440cfa3056f5d323c39a0e1825443cd893
-
SSDEEP
768:I6Q4YhI45BwnjjqK4MubtzB73vXnlJxN0eA1HLPeF:hII4ojjFuxN9ieK6
Malware Config
Signatures
Files
-
c53efdd13915436ec91b1ce69781ec241375939a01c7fd3dcb9552a7512161e3.exe windows x86
127bb67f3cd4b5f3164ae18aad91a620
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AssignProcessToJobObject
BackupWrite
CompareFileTime
ConnectNamedPipe
CreatePipe
CreateToolhelp32Snapshot
DebugActiveProcess
DebugBreak
DeviceIoControl
DuplicateHandle
EnumResourceLanguagesA
FindAtomA
FindFirstFileA
FoldStringA
FormatMessageA
FreeConsole
GetConsoleInputWaitHandle
GetConsoleWindow
GetCurrentConsoleFont
GetDriveTypeA
GetFileInformationByHandle
GetOEMCP
GetProcessShutdownParameters
GetTempFileNameA
GetThreadTimes
GetUserDefaultLCID
GetUserDefaultLangID
GlobalAddAtomA
GlobalFix
GlobalFree
GlobalUnlock
HeapDestroy
HeapLock
InitAtomTable
LoadModule
LocalUnlock
MapViewOfFile
MultiByteToWideChar
OpenFile
OpenFileMappingA
OpenJobObjectA
RaiseException
RegisterWaitForInputIdle
RegisterWowBaseHandlers
RequestWakeupLatency
ScrollConsoleScreenBufferA
SetConsoleCommandHistoryMode
SetConsoleIcon
SetConsoleMode
SetConsoleTitleA
SetHandleCount
SetProcessShutdownParameters
SetSystemPowerState
SetThreadLocale
SetThreadPriorityBoost
SetVolumeLabelA
SetWaitableTimer
TerminateJobObject
UnlockFile
VirtualFreeEx
WaitForSingleObjectEx
WriteConsoleOutputCharacterA
advapi32
BuildExplicitAccessWithNameA
BuildImpersonateExplicitAccessWithNameA
CloseServiceHandle
ConvertAccessToSecurityDescriptorA
CreateRestrictedToken
CryptGetKeyParam
CryptImportKey
EnumDependentServicesA
GetEffectiveRightsFromAclA
GetMultipleTrusteeOperationA
GetSecurityDescriptorLength
GetSecurityDescriptorSacl
ImpersonateSelf
LockServiceDatabase
NotifyBootConfigStatus
OpenProcessToken
RegCloseKey
RegOpenKeyA
RegOpenKeyExA
RegQueryValueA
ReportEventA
SetEntriesInAccessListA
SetSecurityDescriptorSacl
StartServiceA
shell32
ExtractIconResInfoA
SHAppBarMessage
SheGetDirA
SheRemoveQuotesA
StrRStrIA
StrStrIA
Sections
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE