Static task
static1
Behavioral task
behavioral1
Sample
c0b0e536cdb7525c8daf1d03122a1de8e9e04a9bcf23c71bb605647f312c44e7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c0b0e536cdb7525c8daf1d03122a1de8e9e04a9bcf23c71bb605647f312c44e7.exe
Resource
win10v2004-20221111-en
General
-
Target
c0b0e536cdb7525c8daf1d03122a1de8e9e04a9bcf23c71bb605647f312c44e7
-
Size
207KB
-
MD5
a45a9e3fdf209e35189975fddfd9d6ba
-
SHA1
38f74b2d5a2f1029846b4e305be03b1bf95fe3b9
-
SHA256
c0b0e536cdb7525c8daf1d03122a1de8e9e04a9bcf23c71bb605647f312c44e7
-
SHA512
511c05d974a38fd37aa9dc71950cbc090f0c83c6bda04a4409138e628d88dd168b9558a0095bfb16436814bb3358f6a3343e536331332ed272b818c148d95286
-
SSDEEP
6144:K6z8LGramydyw4TV7RgPDGPE4UM0+Kqj8nCpiUC9rL:4Gramydyw4BeKPOqj0oiJ
Malware Config
Signatures
Files
-
c0b0e536cdb7525c8daf1d03122a1de8e9e04a9bcf23c71bb605647f312c44e7.exe windows x86
798894f98627989a711e476215797043
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDateFormatW
GetThreadPriority
GetDiskFreeSpaceW
GetProcAddress
IsDebuggerPresent
GetCurrentThread
lstrcatA
CreateEventW
CreateSemaphoreW
GetWindowsDirectoryW
lstrlenA
FileTimeToDosDateTime
GetCurrentDirectoryW
SuspendThread
GetVersion
GetNumberFormatA
GlobalGetAtomNameW
CompareStringW
GetFileAttributesW
GetDiskFreeSpaceA
MoveFileW
OpenWaitableTimerA
GetStringTypeA
CreateFileMappingA
OpenMutexW
CreateThread
GetModuleHandleA
user32
SetCursorPos
CheckMenuItem
SetTimer
IsChild
CreateDialogIndirectParamW
GetDC
LoadBitmapA
DeleteMenu
EnumDesktopsW
RemoveMenu
GetMessageW
MessageBeep
CreateCaret
SetWindowPos
MessageBoxA
BringWindowToTop
DefFrameProcW
GetClassInfoExW
GetDlgItemInt
FindWindowA
DialogBoxParamA
CopyIcon
EnableWindow
ShowCursor
CopyRect
MonitorFromPoint
UpdateWindow
CreateAcceleratorTableW
GetMenuItemInfoA
MessageBoxIndirectA
CharPrevW
CreateWindowExW
LoadIconW
IsDlgButtonChecked
GetWindowTextW
UnregisterClassW
LoadMenuIndirectW
MessageBoxIndirectW
SetForegroundWindow
ArrangeIconicWindows
LoadCursorW
DefWindowProcW
GetClassNameW
EnableMenuItem
CreateWindowExA
gdi32
SelectPalette
CopyEnhMetaFileA
GetEnhMetaFileW
CreateDIBPatternBrushPt
SetDIBColorTable
Polyline
AddFontResourceA
advapi32
RegQueryValueW
RegOpenKeyExA
RegOpenKeyA
shell32
StrChrIW
StrRChrW
SHGetDiskFreeSpaceExA
SHGetDataFromIDListW
ShellExecuteA
ShellExecuteExW
SHCreateDirectoryExA
StrRChrIW
StrRStrA
shlwapi
SHRegWriteUSValueW
PathIsRelativeW
StrCmpNW
PathUndecorateW
SHRegCloseUSKey
UrlCanonicalizeW
PathMakePrettyA
ColorHLSToRGB
AssocQueryKeyW
SHCopyKeyA
setupapi
SetupRemoveSectionFromDiskSpaceListA
pSetupGetQueueFlags
SetupGetInfFileListA
SetupDiEnumDriverInfoW
CM_Enumerate_EnumeratorsW
CM_Intersect_Range_List
SetupInstallServicesFromInfSectionA
SetupOpenInfFileW
inetcomm
MimeOleSMimeCapRelease
EssMLHistoryDecodeEx
HrGetLastOpenFileDirectory
HrSaveAttachToFile
MimeOleStripHeaders
MimeOleParseRfc822AddressW
MimeOleGetPropW
Sections
.jvHreF Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.EM Size: 512B - Virtual size: 391KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sY Size: 3KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.VDqhQ Size: 3KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.REvSwR Size: 2KB - Virtual size: 482KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 103KB - Virtual size: 440KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.c Size: 1024B - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 858B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ