Static task
static1
Behavioral task
behavioral1
Sample
c7654c49d3bf7952e1aba85341e38a7474f957d6662fea2f4881df3b9c9e822d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c7654c49d3bf7952e1aba85341e38a7474f957d6662fea2f4881df3b9c9e822d.exe
Resource
win10v2004-20220812-en
General
-
Target
c7654c49d3bf7952e1aba85341e38a7474f957d6662fea2f4881df3b9c9e822d
-
Size
576KB
-
MD5
b0d35e8c7012cd6709f70105dc750e75
-
SHA1
a3e7537710eb0dc65ee81e0457ce528056d620f0
-
SHA256
c7654c49d3bf7952e1aba85341e38a7474f957d6662fea2f4881df3b9c9e822d
-
SHA512
648ffc7c25b3ea5b2d350384ec375e1f990f4289d3974d8aa8663087eb12d4beb89c5127ed4012173d4ac7dbdbf7bbf4687b7bae07e892ef94b4ec10adcd22d1
-
SSDEEP
6144:n6uqDP0NgS7xWuFWwmk8Ku/IhNomBG2asIDAmRiVjsIVdktAQumM:n6uqi7xW/8u/IPhdasID9RiVjsC2OoM
Malware Config
Signatures
Files
-
c7654c49d3bf7952e1aba85341e38a7474f957d6662fea2f4881df3b9c9e822d.exe windows x86
2fa4cb9b45aca628575947d9bd6dbf58
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
Sleep
FreeConsole
CloseHandle
GetLastError
CreateMutexA
CreateProcessA
CopyFileA
GetWindowsDirectoryA
GetTempPathA
GetSystemDirectoryA
GetModuleFileNameA
FindNextFileA
SetErrorMode
GetVersionExA
GetTickCount
CreateFileA
SetCurrentDirectoryA
WaitForSingleObject
GetCurrentProcess
GetProcAddress
LoadLibraryA
TerminateProcess
OpenProcess
CreateThread
WinExec
AllocConsole
CreateToolhelp32Snapshot
Process32First
GetModuleHandleA
Process32Next
GetNumberOfConsoleInputEvents
PeekConsoleInputA
GetConsoleMode
SetConsoleMode
ReadConsoleInputA
GetLocaleInfoW
SetEndOfFile
IsBadCodePtr
SetEnvironmentVariableA
GetOEMCP
GetACP
SetStdHandle
SetConsoleCtrlHandler
GetStringTypeW
GetStringTypeA
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
WideCharToMultiByte
MultiByteToWideChar
GetTimeZoneInformation
GetSystemTime
GetLocalTime
IsBadWritePtr
IsBadReadPtr
HeapValidate
DeleteFileA
ExitProcess
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
GetVersion
LCMapStringA
LCMapStringW
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
InterlockedIncrement
GetCPInfo
CompareStringA
CompareStringW
HeapAlloc
HeapReAlloc
HeapFree
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
SetFilePointer
FlushFileBuffers
ReadFile
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
IsValidLocale
WriteConsoleA
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegSetValueExA
RegCloseKey
OpenProcessToken
ws2_32
WSASocketA
bind
listen
accept
closesocket
gethostbyname
htons
inet_ntoa
socket
connect
send
recv
WSACleanup
WSAStartup
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
Sections
.text Size: 496KB - Virtual size: 493KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ