Static task
static1
Behavioral task
behavioral1
Sample
c5b6ee8f86f5fbdd64566a63becb0e61844f2aa91a6f9bb82a60c9d03314ab20.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c5b6ee8f86f5fbdd64566a63becb0e61844f2aa91a6f9bb82a60c9d03314ab20.exe
Resource
win10v2004-20221111-en
General
-
Target
c5b6ee8f86f5fbdd64566a63becb0e61844f2aa91a6f9bb82a60c9d03314ab20
-
Size
276KB
-
MD5
00ae07e7ab54ea8ca70a2d74db7d63c6
-
SHA1
d0737647dfffee7e6271e17e908eb67c6309f151
-
SHA256
c5b6ee8f86f5fbdd64566a63becb0e61844f2aa91a6f9bb82a60c9d03314ab20
-
SHA512
5b8871831bb173ce05888e9f28c48cde654a602d7d1bdc6ee90042a75bbce5fae86b715f726c304db1d34371154c59f04fa723b3c8b4cc4745b60ca28e25962c
-
SSDEEP
6144:IcD08VhiUJw46Xjhbg6xDyv2GALijX1Na/HZuk:IcD08VwUJ76Xjh0sFXiJk
Malware Config
Signatures
Files
-
c5b6ee8f86f5fbdd64566a63becb0e61844f2aa91a6f9bb82a60c9d03314ab20.exe windows x86
99a29c94947fc69b552f0a916432f027
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
EnterCriticalSection
GetModuleFileNameA
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
WaitForSingleObject
GetCurrentProcessId
CreateEventW
GetCurrentThread
TerminateProcess
GetSystemTimeAsFileTime
QueryPerformanceCounter
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetFilePointer
LocalAlloc
HeapReAlloc
IsBadReadPtr
IsBadWritePtr
HeapDestroy
FreeEnvironmentStringsA
GetEnvironmentStrings
LCMapStringA
DeleteCriticalSection
MultiByteToWideChar
IsBadCodePtr
GetSystemDefaultLCID
GetStringTypeA
LCMapStringW
LoadLibraryA
GetProcAddress
VirtualAlloc
GetOEMCP
GetACP
GetCPInfo
RtlUnwind
VirtualFree
HeapCreate
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
VirtualQuery
InitializeCriticalSection
WideCharToMultiByte
GetStringTypeW
Sleep
SetLastError
GetCurrentProcess
CreateFileA
GetFileSize
GetCurrentThreadId
lstrlenA
GetProcessHeap
HeapAlloc
HeapFree
ReadFile
WriteFile
FlushFileBuffers
DisconnectNamedPipe
CreateNamedPipeA
GetLastError
ConnectNamedPipe
OutputDebugStringA
CreateThread
IsDBCSLeadByte
CloseHandle
user32
UnregisterClassA
SetCapture
InflateRect
CheckMenuItem
LoadBitmapA
DrawFocusRect
GetSysColorBrush
EnumChildWindows
SystemParametersInfoA
ScreenToClient
GetForegroundWindow
GetDesktopWindow
EnableMenuItem
ClientToScreen
CheckDlgButton
IsDlgButtonChecked
GetWindowLongA
PostMessageA
LoadStringA
SendMessageA
DefWindowProcA
InvalidateRect
ReleaseDC
SendMessageW
GetDC
EnableWindow
MessageBoxA
SetCursor
LoadCursorW
GetWindow
DispatchMessageA
IsWindow
DestroyIcon
LoadImageW
GetSysColor
BeginPaint
EndPaint
GetParent
KillTimer
SetTimer
GetMessageW
ShowWindow
SetWindowLongW
LoadStringW
CharNextW
advapi32
AllocateAndInitializeSid
RegOpenKeyExW
RegQueryValueExA
OpenThreadToken
GetTokenInformation
RegOpenKeyExA
QueryServiceStatus
RegCreateKeyExA
RegCreateKeyW
GetSecurityDescriptorDacl
GetSidIdentifierAuthority
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegDeleteKeyA
LookupAccountSidA
IsValidSid
LsaQueryInformationPolicy
LsaFreeMemory
LsaClose
LsaOpenPolicy
RegCloseKey
ole32
StringFromGUID2
StringFromCLSID
CLSIDFromString
CoCreateInstance
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
CoTaskMemRealloc
imm32
ImmGetGuideLineA
Sections
.code Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 248KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE