Static task
static1
Behavioral task
behavioral1
Sample
c54dd6b69be5cd7d99e03735fa4e601bb40a6ed93dd04846b9e741b47fa71019.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c54dd6b69be5cd7d99e03735fa4e601bb40a6ed93dd04846b9e741b47fa71019.exe
Resource
win10v2004-20221111-en
General
-
Target
c54dd6b69be5cd7d99e03735fa4e601bb40a6ed93dd04846b9e741b47fa71019
-
Size
192KB
-
MD5
eb334102e2a02bedeff9a3a336cbe0f3
-
SHA1
0539456c9abadc3faeb8b9bec3369e7dfe03e43a
-
SHA256
c54dd6b69be5cd7d99e03735fa4e601bb40a6ed93dd04846b9e741b47fa71019
-
SHA512
0a27110a3379e90ca9d38b9c5430a6443bd913e828cb48b64f78b272c17441fc5ced238f286dd68e7fb8f7b374832018ea3a85ab48244f7dc4f54d16f8546a85
-
SSDEEP
3072:i2QvHhCEkB6WW9IRwtecbTZGL/qpV15gDi8LsbAD7Ts+cXo9K1z:i4B6WW9IR4ewGL/q/16sis+pw
Malware Config
Signatures
Files
-
c54dd6b69be5cd7d99e03735fa4e601bb40a6ed93dd04846b9e741b47fa71019.exe windows x86
649d8eb921c84b8c2c32ad3ae01160be
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
SetFileSecurityA
GetSecurityDescriptorControl
SetSecurityDescriptorDacl
AddAccessAllowedAce
AddAce
EqualSid
GetAce
InitializeAcl
GetLengthSid
GetAclInformation
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
LookupAccountNameA
GetFileSecurityA
RegCloseKey
RegOpenKeyExA
RegEnumValueA
RegEnumKeyExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
ChangeServiceConfig2A
CloseServiceHandle
DeleteService
CreateServiceA
OpenSCManagerA
ControlService
StartServiceA
GetServiceKeyNameA
GetUserNameA
msvcrt
strchr
strlen
free
_controlfp
__set_app_type
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
strstr
strncpy
_CxxThrowException
__CxxFrameHandler
strcmp
__p__fmode
strncat
strcat
memset
??2@YAPAXI@Z
memcpy
??3@YAXPAX@Z
tolower
toupper
_ftol
srand
rand
_itoa
_strnicmp
_strrev
_strlwr
_stricmp
_strupr
strcpy
_except_handler3
malloc
user32
wsprintfA
CharNextA
kernel32
LoadLibraryA
RaiseException
InterlockedExchange
LocalAlloc
FreeLibrary
GetStartupInfoA
WideCharToMultiByte
GetCommandLineA
SetUnhandledExceptionFilter
OpenEventA
ExpandEnvironmentStringsA
GetShortPathNameA
CreateEventA
WaitForSingleObject
GetModuleFileNameA
lstrcmpiA
FindFirstFileA
FindNextFileA
CreateFileA
WriteFile
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
MoveFileA
GetCurrentDirectoryA
GetTempPathA
SetEnvironmentVariableA
ExitProcess
GetProcessHeap
HeapAlloc
GetModuleHandleA
GetProcAddress
Sleep
HeapFree
GetWindowsDirectoryA
MultiByteToWideChar
GetSystemDirectoryA
lstrcatA
GetTickCount
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrcpyA
lstrlenA
DeleteFileA
SetFileAttributesA
CloseHandle
Process32Next
GetCurrentProcessId
Process32First
CreateToolhelp32Snapshot
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ