Static task
static1
Behavioral task
behavioral1
Sample
c5708ef145894f8006badfa152a45b1f613bbdd237245811fe6c55160d5cf529.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c5708ef145894f8006badfa152a45b1f613bbdd237245811fe6c55160d5cf529.exe
Resource
win10v2004-20221111-en
General
-
Target
c5708ef145894f8006badfa152a45b1f613bbdd237245811fe6c55160d5cf529
-
Size
172KB
-
MD5
d91a13540ce95c2f8de78ecc7886cdf9
-
SHA1
727a3261a07dfe3c366191cfe67a43c30b8b3064
-
SHA256
c5708ef145894f8006badfa152a45b1f613bbdd237245811fe6c55160d5cf529
-
SHA512
3adf510440dafd3f1ad47fd479e81a19190ad1145866ec5bf006af12c03361752d4cd37f36b55dbe20d35b3c9c2b3b1344b789f5519632c693d4a72d04afb6dd
-
SSDEEP
3072:9P9v4CpwqtzR0ZQ6vmE7OOcBe9Xh7+YHdqK6ek:9Vv4Cpws+Q6+E7rKNle
Malware Config
Signatures
Files
-
c5708ef145894f8006badfa152a45b1f613bbdd237245811fe6c55160d5cf529.exe windows x86
90194adaff577d771cc7c7119103fa85
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushFileBuffers
CreateFileA
SetErrorMode
InitializeCriticalSection
lstrlenW
InterlockedExchange
LockResource
SetEvent
FindClose
CompareStringA
GlobalFree
FreeEnvironmentStringsA
WaitForSingleObjectEx
GetLocalTime
GlobalLock
ReadFileEx
CreateEventA
SetEndOfFile
FormatMessageW
CreateFileW
SetStdHandle
CloseHandle
LoadResource
CreateEventW
CompareStringW
GetFileSize
GetFileAttributesW
ReleaseMutex
HeapDestroy
SetEnvironmentVariableA
InterlockedExchangeAdd
SleepEx
GlobalAlloc
ReadFile
SetFilePointerEx
GlobalUnlock
ResetEvent
lstrlenA
GetVersionExA
DeleteFileW
WaitForMultipleObjectsEx
GetThreadLocale
GetSystemTime
DeleteFileA
FormatMessageA
GetSystemInfo
RaiseException
TryEnterCriticalSection
GetModuleFileNameW
WriteFileEx
FindCloseChangeNotification
GetStartupInfoA
GetFileAttributesA
SetFilePointer
CreateThread
SizeofResource
LocalFree
FreeLibrary
InterlockedCompareExchange
GetFileSizeEx
RegisterWaitForSingleObject
LocalAlloc
GetModuleHandleA
WaitForSingleObject
VirtualAlloc
user32
SetMenuItemBitmaps
GetWindowWord
SetWindowPos
LoadStringA
SetMenuItemInfoW
DefWindowProcA
RegisterClassA
DestroyIcon
SendMessageA
ShowWindowAsync
GetCursorPos
LoadIconW
SetWindowLongA
SetMenuItemInfoA
GetMenu
GetClientRect
DefWindowProcW
LoadCursorW
GetForegroundWindow
PostMessageA
CreateWindowExW
SetWindowTextW
SetWindowTextA
ReleaseDC
GetMenuItemCount
TranslateMessage
GetWindowTextW
MessageBeep
ole32
CoSetProxyBlanket
CoRegisterClassObject
CoTaskMemRealloc
CoRegisterChannelHook
advapi32
CheckTokenMembership
OpenThreadToken
QueryServiceStatus
GetSecurityDescriptorDacl
GetTokenInformation
RegDeleteKeyA
RegOpenKeyExA
IsValidSid
RegCreateKeyW
LookupAccountSidA
SetSecurityDescriptorDacl
RegCloseKey
shell32
SHBindToParent
msvcrt
__p__fmode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_except_handler3
__p__commode
__set_app_type
_controlfp
__dllonexit
_onexit
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 132KB - Virtual size: 226KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ