Static task
static1
Behavioral task
behavioral1
Sample
949cca42182cfd8bc35f1a7c121876b7fd98a52e01e917c7b398a724c33cf6cb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
949cca42182cfd8bc35f1a7c121876b7fd98a52e01e917c7b398a724c33cf6cb.exe
Resource
win10v2004-20220901-en
General
-
Target
949cca42182cfd8bc35f1a7c121876b7fd98a52e01e917c7b398a724c33cf6cb
-
Size
930KB
-
MD5
126b790dc167198bbe4ad215d1edb9d0
-
SHA1
e17d369034e6dda98d978e7ab927bde888ce0f0f
-
SHA256
949cca42182cfd8bc35f1a7c121876b7fd98a52e01e917c7b398a724c33cf6cb
-
SHA512
4843ee8b88311cea35552dcd0549fd032642c87cf78eaae1697a166ce5c5ebc49884033be5081f62bb90ac89189359e5e9cc395ceae393f717ce16289451d89d
-
SSDEEP
3072:M++YgG4jF0gtALAXLi9CaBl5gIP3UsmeYEgtfo3:pRmICwWebMo3
Malware Config
Signatures
Files
-
949cca42182cfd8bc35f1a7c121876b7fd98a52e01e917c7b398a724c33cf6cb.exe windows x86
1bebe70dd9f18c40187b0e74b0af3420
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
BuildCommDCBW
FormatMessageA
FormatMessageW
GetCurrentProcess
GetNumberFormatW
GetProfileStringW
GetTempPathW
GetWindowsDirectoryW
LocalAlloc
LocalFree
MoveFileW
QueryDosDeviceW
ReadConsoleInputW
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
WaitCommEvent
WriteProfileStringW
lstrcatW
lstrcmpiW
lstrcpyW
GetProcAddress
GetModuleHandleA
ExitProcess
GetLastError
HeapFree
HeapAlloc
GetCommandLineA
GetVersionExA
GetProcessHeap
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
IsDebuggerPresent
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryA
InitializeCriticalSection
SetFilePointer
SetHandleCount
GetFileType
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetCurrentProcessId
GetFileAttributesW
HeapDestroy
HeapCreate
VirtualFree
HeapReAlloc
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
HeapSize
RtlUnwind
GetLocaleInfoA
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetExitCodeProcess
WaitForSingleObject
CloseHandle
CreateProcessA
GetFileAttributesA
RaiseException
FlushFileBuffers
CreateFileA
GetTimeZoneInformation
CompareStringA
CompareStringW
SetEnvironmentVariableA
rpcrt4
NdrByteCountPointerBufferSize
RpcEpResolveBinding
I_RpcParseSecurity
Sections
.text Size: 136KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 260KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 528KB - Virtual size: 539KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE