Static task
static1
Behavioral task
behavioral1
Sample
c7c0b186cac335ef53275712651afcc9bf8cbc77b67c219745797b03320e4ff7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c7c0b186cac335ef53275712651afcc9bf8cbc77b67c219745797b03320e4ff7.exe
Resource
win10v2004-20220812-en
General
-
Target
c7c0b186cac335ef53275712651afcc9bf8cbc77b67c219745797b03320e4ff7
-
Size
314KB
-
MD5
616b83aa61625b6da78020ce41292908
-
SHA1
f430f2e005316818bcc3aaf0af14670fdbc78dd0
-
SHA256
c7c0b186cac335ef53275712651afcc9bf8cbc77b67c219745797b03320e4ff7
-
SHA512
6814f322aa0737fb8ca3311593b96ffdd5732ec31b2913e8bd6e3ed21e3dad1f03b13075bf42cbff189ca520939bee3678ea3f591436dacc811896d441b791f1
-
SSDEEP
6144:1W+EH1P0AU8LWTiUcK6wGi+cdTT0mqxFH0Ci+Eyvd4kOp:1jEHd0Z8ZlKRf+mTbudzvTOp
Malware Config
Signatures
Files
-
c7c0b186cac335ef53275712651afcc9bf8cbc77b67c219745797b03320e4ff7.exe windows x86
3d0ef98b3fa6ad5273d1365a35345fdd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStdHandle
HeapSize
GetStartupInfoA
ReleaseSemaphore
lstrlenA
CreateFileMappingW
LoadLibraryA
SetLastError
RemoveDirectoryW
Sleep
OpenEventW
RemoveDirectoryW
CreateFileA
GetCommandLineW
HeapDestroy
GetFileSize
VirtualProtectEx
DeleteFileA
CreateMutexA
CreatePipe
CreateDirectoryW
SetLastError
GetVersion
WriteConsoleW
ReleaseMutex
user32
DestroyMenu
IsZoomed
GetClassInfoA
CreateIcon
MessageBoxA
GetWindowLongA
PeekMessageA
DestroyMenu
IsWindow
DrawTextW
GetSysColor
FindWindowA
DispatchMessageA
feclient
FeClientInitialize
FeClientInitialize
FeClientInitialize
FeClientInitialize
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 760KB - Virtual size: 760KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE