Static task
static1
Behavioral task
behavioral1
Sample
c729c5dfa66b1492a19092b3101f0ab03870d704b0ed59067484c8eff84996db.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c729c5dfa66b1492a19092b3101f0ab03870d704b0ed59067484c8eff84996db.exe
Resource
win10v2004-20220901-en
General
-
Target
c729c5dfa66b1492a19092b3101f0ab03870d704b0ed59067484c8eff84996db
-
Size
204KB
-
MD5
e8d78e7e625ce6ffe3127354fd94cb12
-
SHA1
55da8d91360b9afc3bfd36ae64c6ab0bc3386b68
-
SHA256
c729c5dfa66b1492a19092b3101f0ab03870d704b0ed59067484c8eff84996db
-
SHA512
0a7ac46f80133fcb56e52e3bd8311a959445d05df358c97254b1c8e1e7e282938290033888069571135c89fa8708c1d5999c131a75e66578c64fe380ff17c95e
-
SSDEEP
3072:kn/159qrlpkXxQ/u3ult+355X4ANUv8Zv2oVJoP:kn/17qhpkXO/6ult+355IANUOK
Malware Config
Signatures
Files
-
c729c5dfa66b1492a19092b3101f0ab03870d704b0ed59067484c8eff84996db.exe windows x86
43aa078d58a06980092d2a045099f829
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDriveStringsA
GlobalFree
GetLastError
GlobalAlloc
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
FindClose
FindNextFileA
FindFirstFileA
Sleep
GetModuleFileNameA
ReleaseMutex
CreateMutexA
CreateFileA
AllocConsole
GetSystemTime
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
SetEnvironmentVariableA
GetDriveTypeA
CompareStringA
MultiByteToWideChar
SetStdHandle
HeapReAlloc
VirtualAlloc
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
SetConsoleCtrlHandler
HeapValidate
IsBadReadPtr
IsBadWritePtr
SetFilePointer
RtlUnwind
VirtualFree
HeapFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetFileType
GetWindowsDirectoryA
CopyFileA
CompareStringW
SetFileAttributesA
SetHandleCount
FlushFileBuffers
GetEnvironmentStringsW
GetEnvironmentStrings
DeleteFileA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
GetProcAddress
LoadLibraryA
InterlockedIncrement
TerminateProcess
GetCurrentProcess
GetFileAttributesA
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
user32
EndDialog
DialogBoxParamA
DestroyWindow
DefWindowProcA
BeginPaint
GetClientRect
DrawTextA
EndPaint
PostQuitMessage
CreateWindowExA
UpdateWindow
LoadIconA
LoadCursorA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
MessageBoxA
FindWindowA
GetWindowThreadProcessId
KillTimer
SetTimer
EnumChildWindows
GetWindowTextA
GetClassNameA
SendMessageA
keybd_event
RegisterClassExA
advapi32
RegSetValueExA
RegCloseKey
RegOpenKeyExA
mpr
WNetOpenEnumA
WNetCloseEnum
WNetEnumResourceA
Sections
.text Size: 148KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ