Static task
static1
Behavioral task
behavioral1
Sample
c7b240572b06814bab86a42f553b577f450d8d06675f35f4ef5c2831f69ce6a0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c7b240572b06814bab86a42f553b577f450d8d06675f35f4ef5c2831f69ce6a0.exe
Resource
win10v2004-20220901-en
General
-
Target
c7b240572b06814bab86a42f553b577f450d8d06675f35f4ef5c2831f69ce6a0
-
Size
200KB
-
MD5
c0e6d4e3569942ab3858317a08850eb2
-
SHA1
384ec3ccb38a95b1ab9475d8871208db7bb55f46
-
SHA256
c7b240572b06814bab86a42f553b577f450d8d06675f35f4ef5c2831f69ce6a0
-
SHA512
a6cba0df29e3f1ce2a847d569493b0eedc800d6ec10777767288b73826ef00ef9188afa59bb95e8e30a3b973f256b46b25ec4e6d3f6fe4242b5bf9a7a46151ab
-
SSDEEP
6144:BlLq/I+mO31DBybYdTJgr9OuZjOVce3BHdmzG3F:vLqbN33RJgnRgVH4zG1
Malware Config
Signatures
Files
-
c7b240572b06814bab86a42f553b577f450d8d06675f35f4ef5c2831f69ce6a0.exe windows x86
9a8cf68be315d192c2d1dad80831a7e8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetVolumeLabelA
Beep
FindClose
CloseHandle
GetVersion
CreateDirectoryA
WaitForMultipleObjects
AddAtomW
GetModuleHandleA
CreatePipe
RemoveDirectoryA
GetTapeStatus
GetFileType
GetCommandLineA
GetModuleFileNameA
GetDriveTypeA
DeleteAtom
HeapFree
FindAtomA
HeapCreate
ExitThread
RemoveDirectoryA
IsBadWritePtr
CreateSemaphoreW
WriteFile
uxtheme
GetThemeBool
CloseThemeData
GetThemeColor
CloseThemeData
GetThemeTextExtent
SetWindowTheme
GetThemeTextMetrics
GetThemeSysSize
DrawThemeBackground
GetWindowTheme
DrawThemeEdge
OpenThemeData
IsThemeActive
odbcbcp
bcp_bind
bcp_bind
bcp_bind
bcp_bind
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 191KB - Virtual size: 191KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE