Static task
static1
Behavioral task
behavioral1
Sample
c9c935ee7d12151d14c2f507687a5500c0fa56f0e7743dfc8c8e59d61b83f32e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c9c935ee7d12151d14c2f507687a5500c0fa56f0e7743dfc8c8e59d61b83f32e.exe
Resource
win10v2004-20220901-en
General
-
Target
c9c935ee7d12151d14c2f507687a5500c0fa56f0e7743dfc8c8e59d61b83f32e
-
Size
296KB
-
MD5
54710a9c0172c88b66a3e9f422368ae0
-
SHA1
5d8e91ecb82a8e57bf85002579d18c2db3514424
-
SHA256
c9c935ee7d12151d14c2f507687a5500c0fa56f0e7743dfc8c8e59d61b83f32e
-
SHA512
8b200c56ba3636cffdb7dee782cf10814a4e72a7b641d238636b62a838ba4e81c36d0b6859f0e02cfc493413d3d5640af1619f2d12da797c83c96a37c06a90e2
-
SSDEEP
6144:LXMG4Ya05AY2fuZLLrus9UWG4f1IxGgCujXv5:NDa0ab6LZff2xGluDR
Malware Config
Signatures
Files
-
c9c935ee7d12151d14c2f507687a5500c0fa56f0e7743dfc8c8e59d61b83f32e.exe windows x86
10ae848bbd543968dbacb7725ebda1ab
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetNamedPipeHandleState
SuspendThread
WriteProcessMemory
SwitchToFiber
FreeResource
GetTimeZoneInformation
GetModuleFileNameW
CreateEventA
SetLastError
GetSystemTimeAsFileTime
GetSystemTime
FormatMessageW
LocalAlloc
GetDriveTypeW
CopyFileExW
GetTempPathW
AllocConsole
TlsGetValue
TryEnterCriticalSection
SetConsoleTitleA
CreateDirectoryW
CreateDirectoryExA
SetCommMask
GetFileType
_llseek
FillConsoleOutputCharacterA
GetProfileStringA
Beep
IsDBCSLeadByteEx
DeleteCriticalSection
GetProcessHeap
GetThreadContext
lstrcmpiA
WritePrivateProfileSectionW
GetThreadPriority
VirtualAllocEx
SetProcessShutdownParameters
RemoveDirectoryA
LeaveCriticalSection
FatalAppExitA
CreateProcessA
GetLongPathNameA
EraseTape
ReadConsoleA
FlushFileBuffers
QueryDosDeviceW
SetFileTime
FreeLibraryAndExitThread
EnumDateFormatsW
GetComputerNameW
GetCommModemStatus
ExitProcess
WritePrivateProfileStringA
GetAtomNameA
GlobalAddAtomA
LocalLock
SetEvent
GetEnvironmentStringsW
OutputDebugStringW
SetEnvironmentVariableW
DosDateTimeToFileTime
GetProfileIntA
SetThreadLocale
LoadLibraryExW
GetUserDefaultLCID
ReleaseMutex
ConnectNamedPipe
LoadResource
GetVersionExA
GetDiskFreeSpaceExA
VirtualProtect
GetModuleHandleA
GlobalFlags
GetCurrentDirectoryW
ClearCommBreak
CreateMutexW
lstrlenA
DeleteFiber
VirtualAlloc
GetStartupInfoA
user32
DispatchMessageA
AttachThreadInput
GetKeyNameTextA
SetCursor
LoadStringA
SetCapture
GetPropW
FindWindowA
IsIconic
LoadBitmapA
GetProcessWindowStation
SetUserObjectInformationW
HideCaret
DialogBoxParamA
SetRect
CopyAcceleratorTableA
CallWindowProcW
PostThreadMessageA
EnumDisplaySettingsExA
wvsprintfA
TranslateMDISysAccel
DestroyWindow
RegisterClassW
UnionRect
ShowWindow
CountClipboardFormats
DrawAnimatedRects
GetKeyNameTextW
WindowFromDC
InsertMenuA
SendInput
CheckMenuItem
SwapMouseButton
AppendMenuA
DefFrameProcW
PostMessageW
GetCaretBlinkTime
ScrollDC
PostThreadMessageW
LoadStringW
GetUpdateRect
EnumDesktopWindows
ScreenToClient
SetWindowLongA
CreateCaret
FindWindowExW
LoadMenuIndirectW
GetDlgItemInt
GetUserObjectSecurity
gdi32
Polyline
GetDIBits
GetClipBox
PolyDraw
comdlg32
ReplaceTextW
GetSaveFileNameA
ChooseColorW
FindTextA
advapi32
ReadEventLogW
shell32
ExtractIconA
Shell_NotifyIconW
SHGetSettings
ole32
CoImpersonateClient
oleaut32
SafeArrayGetLBound
SysStringLen
SetErrorInfo
VariantChangeType
QueryPathOfRegTypeLi
shlwapi
SHOpenRegStream2W
UrlIsW
SHSetThreadRef
PathIsRootW
PathGetCharTypeA
SHQueryValueExW
PathGetArgsW
StrCpyW
PathFileExistsA
SHRegGetBoolUSValueW
StrFormatByteSizeW
PathGetCharTypeW
msvcrt
__set_app_type
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_except_handler3
_controlfp
__p__fmode
Sections
.text Size: 236KB - Virtual size: 234KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE