Static task
static1
Behavioral task
behavioral1
Sample
c13542d503a1d7e8da2e5d70b46b122ea4518ca2547caadd7f17af6ae4ebaa55.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c13542d503a1d7e8da2e5d70b46b122ea4518ca2547caadd7f17af6ae4ebaa55.exe
Resource
win10v2004-20221111-en
General
-
Target
c13542d503a1d7e8da2e5d70b46b122ea4518ca2547caadd7f17af6ae4ebaa55
-
Size
381KB
-
MD5
cdc746165523f4719c1448948aa0d6bc
-
SHA1
c962ddf8ac36c655fc5b81968f744168f92e9178
-
SHA256
c13542d503a1d7e8da2e5d70b46b122ea4518ca2547caadd7f17af6ae4ebaa55
-
SHA512
2539e8d327b893825e59a5ae4344775a4c15311163ee38019471598a31a287ef7a0afaede32b6cc6aafc5a86ce22d8ce23e325d1afbbb79b66b8feab68b8bb0b
-
SSDEEP
6144:X3vpdeKNkKIkTYO8xJbsMLf7Z/9Rr0h9vpgRKNoRU9xNqKuzJB1Ke/8CSwp3lwlP:X/p/NkKIkTY/6MLzZ/70h9vp+KNoaxNv
Malware Config
Signatures
Files
-
c13542d503a1d7e8da2e5d70b46b122ea4518ca2547caadd7f17af6ae4ebaa55.exe windows x86
31a4f2386237b0aa8249bb685db6a480
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetModuleHandleA
FreeLibrary
GetProcAddress
GetTickCount
GetThreadLocale
WideCharToMultiByte
GlobalAlloc
MultiByteToWideChar
ReadFile
CloseHandle
WaitForSingleObject
CreateProcessA
SetHandleInformation
CreatePipe
CreateDirectoryA
GetSystemWindowsDirectoryA
FindClose
FindFirstFileA
GetModuleFileNameA
GetVersionExA
GetCurrentProcess
GetNativeSystemInfo
GetLastError
CreateFileA
GetSystemDirectoryA
lstrlenA
LocalAlloc
FormatMessageA
GetLongPathNameA
GetShortPathNameA
InterlockedDecrement
GetWindowsDirectoryA
OutputDebugStringA
GetCurrentProcessId
GetCurrentThreadId
SetEnvironmentVariableW
WriteConsoleW
FlushFileBuffers
HeapSize
SetEnvironmentVariableA
CompareStringW
LCMapStringW
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
CreateFileW
GetFullPathNameW
GetProcessHeap
SetEndOfFile
SetFilePointer
GetFileAttributesA
Sleep
SetStdHandle
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
IsProcessorFeaturePresent
SetLastError
InterlockedIncrement
TlsFree
LocalFree
InterlockedExchange
RaiseException
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
HeapFree
HeapReAlloc
HeapAlloc
GetStringTypeW
GetModuleHandleW
ExitProcess
DecodePointer
DeleteFileA
EnterCriticalSection
LeaveCriticalSection
GetFileType
RtlUnwind
GetDriveTypeW
FindFirstFileExW
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
GetSystemTimeAsFileTime
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetFullPathNameA
GetFileInformationByHandle
PeekNamedPipe
GetCurrentDirectoryW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
HeapCreate
WriteFile
GetStdHandle
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LoadLibraryW
TlsAlloc
TlsGetValue
TlsSetValue
GetExitCodeProcess
user32
wsprintfA
DefWindowProcA
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
CreateWindowExA
RegisterClassA
LoadCursorA
MessageBoxA
ole32
StringFromCLSID
CoTaskMemFree
oleaut32
VariantClear
SysFreeString
SysAllocString
SysStringLen
SysAllocStringByteLen
wsock32
send
connect
htons
ioctlsocket
socket
bind
recv
accept
ntohs
listen
WSAGetLastError
WSAStartup
closesocket
WSAAsyncSelect
getsockname
Sections
.text Size: 134KB - Virtual size: 134KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 164KB - Virtual size: 428KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE