Static task
static1
Behavioral task
behavioral1
Sample
c371405b4aabdc10b8a92cefc5d38510432ac499b5cbf22f415316b6e9361f19.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c371405b4aabdc10b8a92cefc5d38510432ac499b5cbf22f415316b6e9361f19.exe
Resource
win10v2004-20220901-en
General
-
Target
c371405b4aabdc10b8a92cefc5d38510432ac499b5cbf22f415316b6e9361f19
-
Size
51KB
-
MD5
22f02972c2651016550ae459a02eb931
-
SHA1
14ba7ce679b4cd0c4d642e9e12fa04b7e6276f5b
-
SHA256
c371405b4aabdc10b8a92cefc5d38510432ac499b5cbf22f415316b6e9361f19
-
SHA512
b6b5cd6ea914ba295589c7134d7c4d7a03a7c24e3fbb85abdd9d750df81bf9ee4661da4e5ec97bfb8dd95ed114fead21cb6908e943bb0253e37a8749dfe3d7c1
-
SSDEEP
1536:hxGxB/OOlkCe0uE0cvY/FA0AGeRbYfyRpx:rGTOO1uERg/F8GeRbYfSx
Malware Config
Signatures
Files
-
c371405b4aabdc10b8a92cefc5d38510432ac499b5cbf22f415316b6e9361f19.exe windows x86
021017b439035c78d1296fbcd5387395
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
odbctrac
TraceSQLColumnPrivilegesW
TraceSQLPrepare
TraceSQLGetInfoW
TraceSQLGetTypeInfo
TraceSQLError
TraceSQLGetDiagRec
TraceSQLGetEnvAttr
TraceSQLSetPos
TraceReturn
TraceSQLExecDirectW
TraceSQLGetStmtAttrW
imagehlp
SetImageConfigInformation
ImageNtHeader
SymMatchString
SymCleanup
FindDebugInfoFile
SymGetSymFromAddr
SymGetOptions
ImageGetDigestStream
SymGetLineFromName
SymUnDName64
SymGetModuleInfoW64
UpdateDebugInfoFile
RemovePrivateCvSymbolic
GetImageConfigInformation
RemoveRelocations
SymGetSymFromName
UnDecorateSymbolName
mapi32
SzFindLastCh@8
PRProviderInit
MAPIAllocateBuffer@8
ScMAPIXFromCMC
WrapCompressedRTFStream@12
BMAPIDetails
MAPIGetDefaultMalloc@0
MAPIFreeBuffer@4
FtAdcFt@20
HrSzFromEntryID@12
WrapStoreEntryID@24
FBadRowSet@4
HrDispatchNotifications@4
HrValidateIPMSubtree@20
ChangeIdleRoutine@28
HrIStorageFromStream@16
BMAPIFindNext
kernel32
CreateWaitableTimerA
GetStringTypeExA
ExpandEnvironmentStringsA
GetCurrentProcessId
GlobalFindAtomA
LoadLibraryA
Module32Next
GetTickCount
VerifyVersionInfoW
GetProcessHeaps
GetComputerNameW
SetLastError
GetNamedPipeInfo
MapUserPhysicalPagesScatter
AddLocalAlternateComputerNameW
ReadProcessMemory
Sections
.text Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ