Static task
static1
Behavioral task
behavioral1
Sample
c1350dd717048f3b741521c8a78032a90eff5abeb1c88fcac4267d05cc4d9798.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c1350dd717048f3b741521c8a78032a90eff5abeb1c88fcac4267d05cc4d9798.exe
Resource
win10v2004-20221111-en
General
-
Target
c1350dd717048f3b741521c8a78032a90eff5abeb1c88fcac4267d05cc4d9798
-
Size
498KB
-
MD5
0e3af300bcb04fa5afa81a254bd939db
-
SHA1
a8cbbb1d4a6a21bf05f32a4daa18c0933f1ca0de
-
SHA256
c1350dd717048f3b741521c8a78032a90eff5abeb1c88fcac4267d05cc4d9798
-
SHA512
26663454e6ba3250e646441d60ead7c020e4b2624ed557bb2ec34031878fe0d8c990d45802eb53c9d40bc937f6edddc6b4197fce5ae50dc66ec8f9c0e55317a9
-
SSDEEP
12288:8vu+ma3VMxVZTLaUvhHLe034vc7mcO9vdrjSiaPZt3mu:ou+maYVBa6C034vcS1SJn2u
Malware Config
Signatures
Files
-
c1350dd717048f3b741521c8a78032a90eff5abeb1c88fcac4267d05cc4d9798.exe windows x86
11c882970aeace6c969aef540f9774c4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
SizeofResource
CreateFileW
MultiByteToWideChar
GetTempPathW
GetLocalTime
LockResource
CloseHandle
DeleteFileW
lstrlenA
LoadLibraryW
lstrcatA
GetProcAddress
GetSystemWindowsDirectoryW
WriteFile
DeviceIoControl
lstrcpyA
GetProcessHeap
HeapFree
HeapAlloc
LoadResource
CreateFileA
SetFilePointer
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
LoadLibraryA
GetVersionExW
FindResourceW
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
GetCommandLineA
GetStartupInfoA
HeapValidate
IsBadReadPtr
RaiseException
RtlUnwind
TlsGetValue
GetModuleHandleW
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
GetLastError
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
WideCharToMultiByte
LCMapStringA
LCMapStringW
DebugBreak
GetStdHandle
OutputDebugStringA
WriteConsoleW
GetFileType
OutputDebugStringW
ExitProcess
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
HeapDestroy
HeapCreate
VirtualFree
HeapSize
HeapReAlloc
VirtualAlloc
FlushFileBuffers
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
user32
wsprintfW
wsprintfA
advapi32
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
shell32
ShellExecuteW
wininet
InternetCloseHandle
InternetOpenW
InternetOpenUrlW
shlwapi
PathFileExistsW
PathAppendW
iphlpapi
GetAdaptersInfo
Sections
.text Size: 154KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 338KB - Virtual size: 338KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ