Static task
static1
Behavioral task
behavioral1
Sample
c5a8f63d705ddb0c7a9f5dbd9d7c15a3b96db7971da06e8f9b2d22081a68b07e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c5a8f63d705ddb0c7a9f5dbd9d7c15a3b96db7971da06e8f9b2d22081a68b07e.exe
Resource
win10v2004-20220812-en
General
-
Target
c5a8f63d705ddb0c7a9f5dbd9d7c15a3b96db7971da06e8f9b2d22081a68b07e
-
Size
128KB
-
MD5
8e59a27fb8695b94d2a9f59e111de801
-
SHA1
a852e7c60ffb6c852b3da46cfc1565b824c80777
-
SHA256
c5a8f63d705ddb0c7a9f5dbd9d7c15a3b96db7971da06e8f9b2d22081a68b07e
-
SHA512
289a08b2028815389d615ff4696853235dce7d1303d79236f2eb98204ede1400b3eda7526fc6f8a112d72744f2b5ccf6c28c99fa3e5d1420194a7bbee93781c2
-
SSDEEP
3072:Mc6tRQlihqHT3ge38SphraV7NqJKa8/J0T:MptRuj37ZURnPy
Malware Config
Signatures
Files
-
c5a8f63d705ddb0c7a9f5dbd9d7c15a3b96db7971da06e8f9b2d22081a68b07e.exe windows x86
8e2ffde3dd0dc201aa69dec27eaccdd7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord1158
ord6877
ord533
ord2820
ord801
ord5194
ord6407
ord1997
ord798
ord5856
ord3178
ord3811
ord551
ord3185
ord539
ord2763
ord940
ord4202
ord939
ord922
ord4278
ord538
ord535
ord2614
ord823
ord860
ord6143
ord5861
ord6883
ord537
ord5710
ord941
ord2781
ord4058
ord3181
ord1980
ord2915
ord5572
ord5683
ord4129
ord858
ord924
ord4204
ord4277
ord2764
ord2818
ord926
ord5608
ord356
ord2770
ord668
ord825
ord540
ord541
ord800
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
_XcptFilter
_exit
_onexit
__dllonexit
?terminate@@YAXXZ
atol
_except_handler3
fputs
exit
atoi
time
srand
memmove
_errno
strerror
_mbsstr
mbtowc
strtol
wctomb
_mbsnbcmp
_mbschr
_mbclen
_mbsnbcpy
fwrite
fopen
fseek
ftell
fread
_mbsnbicmp
sprintf
fclose
_mbscmp
__CxxFrameHandler
rand
kernel32
LoadLibraryA
HeapDestroy
HeapAlloc
HeapCreate
CloseHandle
Process32Next
TerminateProcess
OpenProcess
GetProcAddress
CreateToolhelp32Snapshot
GetPrivateProfileStringA
Sleep
GetVersionExA
GetSystemDirectoryA
lstrlenA
SetFileAttributesA
DeleteFileA
FreeLibrary
CopyFileA
GetShortPathNameA
WaitForSingleObject
WinExec
WritePrivateProfileStringA
GetPrivateProfileIntA
GetModuleFileNameA
MultiByteToWideChar
GetPrivateProfileSectionNamesA
GetPrivateProfileSectionA
CreateDirectoryA
Process32First
GetFileAttributesA
GetTempPathA
user32
SendMessageA
wsprintfA
advapi32
AllocateAndInitializeSid
RegDeleteKeyA
RegCreateKeyExA
InitializeAcl
LookupAccountNameA
AddAccessAllowedAce
SetNamedSecurityInfoA
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
GetUserNameA
RegDeleteValueA
shell32
ShellExecuteA
SHFileOperationA
ShellExecuteExA
SHChangeNotify
ole32
CoUninitialize
CoInitialize
CoCreateInstance
urlmon
URLDownloadToFileA
msvcp60
??0Init@ios_base@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
wininet
FindCloseUrlCache
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
InternetGetConnectedState
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 84KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ