Static task
static1
Behavioral task
behavioral1
Sample
c36862731673a7a37b4bdbb00c32f718ecee14d0d93db38c1b706bce81e9b0bb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c36862731673a7a37b4bdbb00c32f718ecee14d0d93db38c1b706bce81e9b0bb.exe
Resource
win10v2004-20220901-en
General
-
Target
c36862731673a7a37b4bdbb00c32f718ecee14d0d93db38c1b706bce81e9b0bb
-
Size
307KB
-
MD5
b858690f1ee96cdf6192e4320f7959c0
-
SHA1
63edb3d6bf812401dd0163cbebcc9f902cee8e74
-
SHA256
c36862731673a7a37b4bdbb00c32f718ecee14d0d93db38c1b706bce81e9b0bb
-
SHA512
13836ef6f1e892e656443f25960a3161b21b2f254627385f20172a1481c11e1309e561be4388cde09950b8473369d003a971abc0cce109158d0d96aad0b7f122
-
SSDEEP
6144:oyFYaM9huos9CkPpD/C/tldQUkvUt1b7ffM8QLf3tc:oyFanAjdC/3+U/b73Qb3t
Malware Config
Signatures
Files
-
c36862731673a7a37b4bdbb00c32f718ecee14d0d93db38c1b706bce81e9b0bb.exe windows x86
9e69e6f4fb0f272a1c833b6232983116
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceExW
lstrcmpiA
GetModuleFileNameW
AllocConsole
OpenSemaphoreW
SetCommTimeouts
MoveFileExA
GetShortPathNameA
WriteConsoleOutputCharacterA
GetModuleHandleA
ReleaseSemaphore
DeleteCriticalSection
GetCurrentProcessId
GetDateFormatA
GetThreadPriority
GlobalFree
GetFileType
VirtualLock
lstrcatW
ReadDirectoryChangesW
MoveFileW
GetTapeParameters
GetSystemTime
VirtualFree
GetWindowsDirectoryA
WritePrivateProfileSectionW
GetCurrentProcess
GetLocaleInfoW
GetProcessHeap
FatalAppExitA
CreateMutexW
lstrcpyA
LCMapStringA
LocalAlloc
GetConsoleCursorInfo
GetProcessTimes
SetupComm
SetFileTime
EnumResourceLanguagesW
SetNamedPipeHandleState
SuspendThread
GetCommandLineW
SetTimeZoneInformation
GetDriveTypeA
DosDateTimeToFileTime
ReadFileScatter
EnumCalendarInfoW
IsBadReadPtr
LocalFileTimeToFileTime
GenerateConsoleCtrlEvent
LocalReAlloc
FreeLibrary
TryEnterCriticalSection
GetSystemDirectoryW
GetPrivateProfileStringA
GetHandleInformation
InitializeCriticalSection
PulseEvent
ReadConsoleInputW
SetConsoleWindowInfo
GetNumberFormatW
LoadResource
ConnectNamedPipe
ReadConsoleOutputA
LoadLibraryExA
GetLogicalDriveStringsA
FindFirstFileA
EnumSystemCodePagesW
RemoveDirectoryW
QueryDosDeviceA
GetProfileIntA
IsBadStringPtrA
SetConsoleOutputCP
IsBadWritePtr
SetThreadAffinityMask
GetBinaryTypeA
FlushConsoleInputBuffer
WriteProcessMemory
AreFileApisANSI
lstrcmpiW
SetEvent
GlobalFindAtomW
FreeEnvironmentStringsA
GetShortPathNameW
FormatMessageW
GetCommState
FindFirstFileExW
RaiseException
WritePrivateProfileStructA
GetCommConfig
WriteConsoleOutputW
CreatePipe
TlsGetValue
PeekNamedPipe
GetOEMCP
GetThreadContext
UnhandledExceptionFilter
GetFileInformationByHandle
OpenMutexA
SetCurrentDirectoryA
SetErrorMode
GlobalFlags
GetCommandLineA
lstrlenA
VirtualAlloc
GetStringTypeExW
ExitProcess
user32
DrawTextW
DefDlgProcW
ChangeMenuA
TranslateAcceleratorA
GetClassInfoW
GetUpdateRect
LoadIconA
DeferWindowPos
GrayStringA
MsgWaitForMultipleObjectsEx
GetDlgItem
DialogBoxIndirectParamW
DefFrameProcW
GetClipboardSequenceNumber
GetMenuItemID
SendNotifyMessageW
GetScrollRange
MsgWaitForMultipleObjects
CreateCursor
EnumWindowStationsW
WinHelpA
GetCapture
SendMessageCallbackW
IsRectEmpty
RegisterHotKey
CopyAcceleratorTableW
OpenIcon
GetKeyboardLayoutList
DispatchMessageW
TranslateAcceleratorW
HideCaret
HiliteMenuItem
GetWindowLongW
GetClientRect
EnableMenuItem
MapDialogRect
ValidateRgn
wvsprintfW
CallNextHookEx
GetClassLongW
OemToCharA
IsWindowUnicode
InflateRect
SwapMouseButton
TabbedTextOutA
IsCharAlphaNumericA
IsCharAlphaW
SetWindowWord
EnumDisplaySettingsW
GetDlgCtrlID
IsDlgButtonChecked
CopyIcon
MenuItemFromPoint
GetMessageTime
DialogBoxParamA
AdjustWindowRect
UnhookWindowsHook
EndDialog
MonitorFromPoint
RegisterDeviceNotificationW
gdi32
GetNearestColor
GetObjectA
Chord
ScaleViewportExtEx
ResizePalette
GetPixelFormat
SetTextAlign
EqualRgn
CreateSolidBrush
GetCurrentObject
advapi32
ControlService
GetSecurityDescriptorGroup
ReadEventLogW
RegCloseKey
RegDeleteValueW
InitializeAcl
SetNamedSecurityInfoA
RegOpenKeyW
OpenServiceA
CryptEncrypt
ImpersonateNamedPipeClient
AccessCheckAndAuditAlarmA
RegCreateKeyA
CryptDestroyHash
SetPrivateObjectSecurity
SetSecurityDescriptorGroup
AddAccessDeniedAce
GetAclInformation
CryptVerifySignatureA
RegDeleteKeyW
RegEnumValueW
EnumServicesStatusA
PrivilegeCheck
LookupPrivilegeValueW
GetUserNameW
MakeSelfRelativeSD
GetExplicitEntriesFromAclW
StartServiceCtrlDispatcherW
QueryServiceObjectSecurity
CryptGetHashParam
shell32
SHFileOperationA
ShellExecuteA
ole32
CoImpersonateClient
OleGetIconOfClass
oleaut32
SafeArrayCreate
SysStringLen
SafeArrayUnaccessData
SysFreeString
SysAllocStringLen
SafeArrayGetElement
SetErrorInfo
LoadTypeLi
comctl32
ImageList_SetDragCursorImage
ImageList_GetDragImage
shlwapi
wvnsprintfW
StrChrIW
PathStripToRootA
UrlApplySchemeW
PathFindExtensionA
StrCmpNIA
SHRegCloseUSKey
StrCatW
StrChrW
PathFileExistsW
SHQueryValueExW
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 295KB - Virtual size: 295KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE