Static task
static1
Behavioral task
behavioral1
Sample
c934d6459eb47dd568a21d886e1c3227f0aedc58da42107073ccfdda312e93ec.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c934d6459eb47dd568a21d886e1c3227f0aedc58da42107073ccfdda312e93ec.exe
Resource
win10v2004-20220812-en
General
-
Target
c934d6459eb47dd568a21d886e1c3227f0aedc58da42107073ccfdda312e93ec
-
Size
8KB
-
MD5
c9c9c3dfb55a6ed56e016ec628e32528
-
SHA1
becd8af8c39d567ac9837227d331c1ccf6f76b1a
-
SHA256
c934d6459eb47dd568a21d886e1c3227f0aedc58da42107073ccfdda312e93ec
-
SHA512
3e9c2afebddf0fe392478a669d200ba4919a7efc50a1ce2f62bf6fc9ce50729ff574487a501c6c03626e4adda62bff5df1f2a86dd034a892bb3037a6ba62c77a
-
SSDEEP
96:e5KS0L4SYZ+F9PJtofedY5CdMPpuCDnwZUP42M+yhBqZla0rjC2VLvMv2:eGLVywxRdY5CdjA+a4tDfqZla0r0v2
Malware Config
Signatures
Files
-
c934d6459eb47dd568a21d886e1c3227f0aedc58da42107073ccfdda312e93ec.exe windows x86
c70fc1791e52f2b85087d26377640c2c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
crtdll
memset
strlen
memcpy
strcpy
strcat
kernel32
GetModuleHandleA
HeapCreate
GetWindowsDirectoryA
HeapDestroy
ExitProcess
Sleep
HeapAlloc
InitializeCriticalSection
GetCurrentProcess
DuplicateHandle
CloseHandle
CreatePipe
GetStdHandle
CreateProcessA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapReAlloc
shell32
ShellExecuteExA
Sections
.code Size: 512B - Virtual size: 439B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.flat Size: 512B - Virtual size: 7B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE