Static task
static1
Behavioral task
behavioral1
Sample
c1a14ebee17fb34e2cc807c34cef1ef8d1c8d825928c8126b4fbe8e77881cb3d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c1a14ebee17fb34e2cc807c34cef1ef8d1c8d825928c8126b4fbe8e77881cb3d.exe
Resource
win10v2004-20220812-en
General
-
Target
c1a14ebee17fb34e2cc807c34cef1ef8d1c8d825928c8126b4fbe8e77881cb3d
-
Size
238KB
-
MD5
9fd3c77a62f7cb9218db2cce59337895
-
SHA1
2986f7776537c22777bb111788bf07beb8778363
-
SHA256
c1a14ebee17fb34e2cc807c34cef1ef8d1c8d825928c8126b4fbe8e77881cb3d
-
SHA512
02909f2ce34072cf7e89c6b99629411c8f427db50e42f013ca957448ec6ee4dcac724b0694c89b1739d53b0dea5a600bdecdc8e52f1651fd931c65467d6da31c
-
SSDEEP
6144:lLZlptdUkuKzoBfnHvPcufGSooY58SzZ1YK6C2EByudv:l9tmaoxHv0Z4YbnY+ByWv
Malware Config
Signatures
Files
-
c1a14ebee17fb34e2cc807c34cef1ef8d1c8d825928c8126b4fbe8e77881cb3d.exe windows x86
d142f319684f8c28987a9b7762d84a42
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
ExtTextOutA
GetTextMetricsA
SetBkMode
SetROP2
SetTextColor
SelectObject
DeleteObject
GetStockObject
Rectangle
CreateFontIndirectA
CreateSolidBrush
advapi32
RegEnumValueA
RegOpenKeyExA
RegDeleteValueA
RegSetValueExA
RegCreateKeyA
RegDeleteKeyA
RegCloseKey
RegEnumKeyA
RegOpenKeyA
RegQueryValueExA
ole32
OleUninitialize
OleInitialize
oleaut32
LoadTypeLi
user32
GetSystemMenu
EnableMenuItem
SetWindowLongA
GetDlgItem
SetFocus
EndDialog
DialogBoxParamA
UpdateWindow
SetWindowTextA
InvalidateRect
DestroyWindow
CharUpperA
CharPrevA
DefWindowProcA
SetClassLongA
PostQuitMessage
BeginPaint
GetClientRect
wsprintfA
FillRect
DrawTextA
SetRect
EndPaint
CreateWindowExA
CreateDialogParamA
PackDDElParam
UnregisterClassA
GetWindowRect
GetSystemMetrics
SetWindowPos
ShowWindow
SetDlgItemTextA
TranslateMessage
DispatchMessageA
SetCursor
GetMessageA
PeekMessageA
PostMessageA
ShowCursor
LoadStringA
SendMessageA
UnpackDDElParam
CharNextA
LoadIconA
RegisterClassA
wvsprintfA
MessageBoxA
LoadCursorA
kernel32
lstrcmpiA
GetLastError
RemoveDirectoryA
TerminateProcess
GlobalFindAtomA
GlobalLock
GlobalUnlock
GlobalAlloc
GlobalFree
GlobalAddAtomA
GlobalDeleteAtom
SetFilePointer
HeapSize
HeapReAlloc
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
SetUnhandledExceptionFilter
WriteFile
HeapCreate
GetStdHandle
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetStringTypeW
WideCharToMultiByte
GetStringTypeA
HeapAlloc
GetCurrentProcess
GetFileAttributesA
ExitProcess
HeapFree
GetOEMCP
GetACP
GetCPInfo
GetVersion
GetCommandLineA
LocalAlloc
lstrcpyA
lstrlenA
LocalFree
lstrcatA
lstrcpynA
GetStartupInfoA
IsDBCSLeadByte
lstrcmpA
CompareStringA
GetWindowsDirectoryA
DeleteFileA
Sleep
CloseHandle
WaitForSingleObject
OpenProcess
FindClose
FindFirstFileA
GetModuleHandleA
CreateProcessA
FreeLibrary
GetProcAddress
LoadLibraryA
SetErrorMode
MultiByteToWideChar
ReadFile
CreateFileA
RtlUnwind
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 172KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ