Static task
static1
Behavioral task
behavioral1
Sample
c0027ab6a92f0b32ede5392ccabc1edab8a7129b5442a42a3dcdb782c02c343c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c0027ab6a92f0b32ede5392ccabc1edab8a7129b5442a42a3dcdb782c02c343c.exe
Resource
win10v2004-20220812-en
General
-
Target
c0027ab6a92f0b32ede5392ccabc1edab8a7129b5442a42a3dcdb782c02c343c
-
Size
43KB
-
MD5
f6af5d46b7a626fa0e1a4d9d4b855784
-
SHA1
744405b760b6d3d3539260a159a28511f0ca0c3c
-
SHA256
c0027ab6a92f0b32ede5392ccabc1edab8a7129b5442a42a3dcdb782c02c343c
-
SHA512
20f9567802665b46216c05716d019f0408ad81731cf9901bd8e8372643ea24179ef5efad2c1aeb46315e26ea1ce9fe73eece8dfcc1197c6389b22ef5d5c28c68
-
SSDEEP
768:Unt6yyH5SDq1pTVbRr+DLDAdowpo4U5RpSeG3H4UJQ9W/cp:qwyyH5SDqzVeLDANuO3H4UYh
Malware Config
Signatures
Files
-
c0027ab6a92f0b32ede5392ccabc1edab8a7129b5442a42a3dcdb782c02c343c.exe windows x86
3d1d4c195e00cec4e92ee67f83d24595
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrChrA
StrToIntA
StrStrA
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
strstr
fopen
fclose
fseek
ftell
fread
??2@YAPAXI@Z
malloc
sprintf
rand
strncmp
wcsncpy
wcscpy
_except_handler3
kernel32
GetTempPathA
GetStartupInfoA
VirtualAlloc
VirtualProtectEx
GetModuleHandleA
ReadProcessMemory
VirtualQueryEx
CreateProcessA
TerminateProcess
ExitThread
RaiseException
InterlockedExchange
LocalAlloc
GetLocaleInfoW
GetComputerNameA
GlobalMemoryStatusEx
GetTickCount
GetSystemDirectoryA
CopyFileA
CreateMutexA
WaitForSingleObject
GetFileAttributesA
GetFileSize
GlobalAlloc
ReadFile
GlobalFree
BeginUpdateResourceA
UpdateResourceA
EndUpdateResourceA
EnumResourceNamesA
FindResourceA
SizeofResource
Sleep
CreateThread
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcpyA
lstrcpynA
DeleteFileA
ExitProcess
SetFileAttributesA
GetModuleFileNameA
GetLastError
ReleaseMutex
OpenMutexA
WinExec
lstrcatA
lstrlenA
CreateFileA
CloseHandle
WriteFile
ResumeThread
SetThreadContext
WriteProcessMemory
VirtualAllocEx
GetModuleHandleW
GetModuleFileNameW
GetThreadContext
CreateProcessW
OpenProcess
GetCurrentProcessId
LockResource
LoadResource
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ