Static task
static1
Behavioral task
behavioral1
Sample
c1e59c554a0ec0204cc8708dc295d82740f0272a6b4c92520f5ada59938f8366.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c1e59c554a0ec0204cc8708dc295d82740f0272a6b4c92520f5ada59938f8366.exe
Resource
win10v2004-20221111-en
General
-
Target
c1e59c554a0ec0204cc8708dc295d82740f0272a6b4c92520f5ada59938f8366
-
Size
276KB
-
MD5
c62a7cec2b245324a752b409bebe0108
-
SHA1
fbdc5f93b97bb7fbee41d138371c5cf10ece9fbe
-
SHA256
c1e59c554a0ec0204cc8708dc295d82740f0272a6b4c92520f5ada59938f8366
-
SHA512
0407f969d7c91e028cc72b7e0bb8ea78990b73c8c2ab44e26184ea2a7332d54bda21595f41a890e894102719d317772d5e3a4fb40201d44acadb771ee010b466
-
SSDEEP
6144:ubQNKag8vlyawBHbkyOufT/deL1I0ivNCXcmq/JIby:ubQcf8kBHbHOufT/dYivQcm+
Malware Config
Signatures
Files
-
c1e59c554a0ec0204cc8708dc295d82740f0272a6b4c92520f5ada59938f8366.exe windows x86
4aa99dd7650d260accc18cb7694d4bc0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateSemaphoreA
WaitForSingleObjectEx
CloseHandle
VirtualFree
VirtualLock
IsDebuggerPresent
GlobalMemoryStatus
VirtualAlloc
ExpandEnvironmentStringsA
GetSystemTimeAsFileTime
ResetEvent
CreateMutexA
GetTempPathA
WaitForSingleObject
HeapReAlloc
ReleaseSemaphore
HeapFree
GetModuleHandleA
SetUnhandledExceptionFilter
HeapValidate
PulseEvent
GetWindowsDirectoryA
OpenEventA
OpenSemaphoreA
HeapAlloc
GetSystemInfo
CreateEventA
VirtualUnlock
ReleaseMutex
OpenProcess
CreateSemaphoreW
HeapDestroy
GetModuleHandleW
GetProcessHeap
lstrcpyW
LeaveCriticalSection
UnhandledExceptionFilter
OutputDebugStringA
HeapSize
GetTempFileNameA
OpenMutexA
ExpandEnvironmentStringsW
VirtualProtect
FreeLibrary
WideCharToMultiByte
SleepEx
GetSystemDirectoryA
DeleteCriticalSection
QueryPerformanceFrequency
GetCurrentThreadId
lstrcpyA
GlobalMemoryStatusEx
SetErrorMode
EnterCriticalSection
advapi32
GetLengthSid
FreeSid
EqualSid
LookupPrivilegeValueA
DuplicateToken
CopySid
InitializeAcl
AddAccessAllowedAce
GetTokenInformation
OpenProcessToken
OpenThreadToken
DuplicateTokenEx
GetUserNameA
SetThreadToken
LookupAccountSidA
SetSecurityDescriptorDacl
SetSecurityDescriptorSacl
AllocateAndInitializeSid
InitializeSecurityDescriptor
ImpersonateLoggedOnUser
AdjustTokenPrivileges
RevertToSelf
shlwapi
PathUnExpandEnvStringsA
PathUnExpandEnvStringsW
user32
CharUpperA
CharUpperW
wsprintfA
OemToCharBuffA
CharLowerA
CharToOemBuffA
GetSystemMetrics
ExitWindowsEx
CharLowerW
dbghelp
ImageRvaToSection
SymRegisterCallback64
SymGetModuleBase64
SymEnumerateSymbols
SymGetLineFromName64
SymUnloadModule
SymGetLinePrev
ddraw
GetSurfaceFromDC
Sections
.text Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.JMVHTQN Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kypMo Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rLmcQ Size: 1024B - Virtual size: 549B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.IiFbn Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Heuvi Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CiWdxqj Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.TvLEK Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rfuBt Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE