TPCjwSWxAciAO
Static task
static1
Behavioral task
behavioral1
Sample
c4c1de36c562e0d923e0f9e3e491459ad0f7be2e16bbc33b6f9983f36f10bda3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c4c1de36c562e0d923e0f9e3e491459ad0f7be2e16bbc33b6f9983f36f10bda3.exe
Resource
win10v2004-20221111-en
General
-
Target
c4c1de36c562e0d923e0f9e3e491459ad0f7be2e16bbc33b6f9983f36f10bda3
-
Size
150KB
-
MD5
bcd7c740ac70f3666f0f1b80c0291510
-
SHA1
1dd08869bcc663a95e913d15b52056dd292e3b8e
-
SHA256
c4c1de36c562e0d923e0f9e3e491459ad0f7be2e16bbc33b6f9983f36f10bda3
-
SHA512
8ab75ce367cf421a6410e6b3472ae2f9053da4b81a23901a6304128caa160226302fc678f772b3c3aa9f9575776702155cecf6abc5201fe3262816961303d4bd
-
SSDEEP
3072:4MrjjLTJ2u+tD35ND803b2Hqq7W239jQNHox2MA04oP+EaS3qhdMX:4WjjLgtDpWC2Uyvx2MgomViK
Malware Config
Signatures
Files
-
c4c1de36c562e0d923e0f9e3e491459ad0f7be2e16bbc33b6f9983f36f10bda3.exe windows x86
4d2250cca5ec43c7cee96bcd7a8d04b4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
time
memcpy
tolower
calloc
wcstol
clock
sprintf
memset
exit
atol
sqrt
_acmdln
memmove
user32
IsWindowUnicode
SetForegroundWindow
ReleaseDC
SetScrollRange
CharUpperA
SetCursor
IsZoomed
TranslateMDISysAccel
OpenIcon
LoadIconA
GetKeyboardState
CreateMenu
GetClassNameA
GetDlgItem
LoadKeyboardLayoutA
ReleaseCapture
GetLastActivePopup
PeekMessageA
IsCharUpperA
GetKeyboardLayoutList
GetDC
IsMenu
SetWindowsHookExA
DrawFrameControl
UpdateWindow
IsChild
OffsetRect
DrawMenuBar
EnableScrollBar
DrawTextA
GetWindowTextA
EqualRect
GetKeyState
IsRectEmpty
DestroyMenu
MapWindowPoints
GetWindowTextLengthA
ActivateKeyboardLayout
GetSysColorBrush
GetForegroundWindow
IsWindowVisible
GetClipboardData
SetWindowTextA
GetWindowPlacement
ChildWindowFromPoint
UnregisterClassA
SetWindowLongW
GetWindowRect
SetPropA
GetCursorPos
GetMenu
AdjustWindowRectEx
GetKeyboardType
ScreenToClient
IsDlgButtonChecked
CharNextA
GetDesktopWindow
SystemParametersInfoA
GetClientRect
SetWindowPlacement
SetParent
GetKeyboardLayout
OemToCharA
kernel32
LoadResource
VirtualAlloc
GetProcAddress
GetStringTypeA
GetACP
GetModuleHandleA
CreateEventA
GetCurrentProcess
GetProcessHeap
lstrcmpA
LoadLibraryA
lstrcpynA
DeleteCriticalSection
GetStdHandle
GlobalAlloc
ExitProcess
VirtualAllocEx
lstrcatA
CreateFileA
ReadFile
GetOEMCP
DeleteFileA
lstrcpyA
WaitForSingleObject
RaiseException
advapi32
RegOpenKeyA
RegQueryValueA
RegDeleteValueA
Exports
Exports
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.badata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ