Static task
static1
Behavioral task
behavioral1
Sample
c0c9044dce7da77fe9092bc022c049a1cf7501b07603e7267190689a4fc1e3ee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c0c9044dce7da77fe9092bc022c049a1cf7501b07603e7267190689a4fc1e3ee.exe
Resource
win10v2004-20220901-en
General
-
Target
c0c9044dce7da77fe9092bc022c049a1cf7501b07603e7267190689a4fc1e3ee
-
Size
329KB
-
MD5
d42360ca526d6633bfaeff7e8f22f43b
-
SHA1
c6b508c66eec675c798a8dccc91a7090aa6c0563
-
SHA256
c0c9044dce7da77fe9092bc022c049a1cf7501b07603e7267190689a4fc1e3ee
-
SHA512
3acae44f5a7c9a937e1c7bca1f694945a34e968260cdf675d42e7dfb851add12a4c755c14f9f9e37d916f5c39bc1acac05f56b83c89c46a1a4726640f43cd2f2
-
SSDEEP
6144:UUGT0fZWGE/Z3RvXQNt4LAG+ybL+qUBfmr5vcUe06yk+IjdHS:UUWwW7/Z3RvXQr4sGVth206NhjdHS
Malware Config
Signatures
Files
-
c0c9044dce7da77fe9092bc022c049a1cf7501b07603e7267190689a4fc1e3ee.exe windows x86
650f3425e751300b3c5f1d133e087033
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
PulseEvent
GetComputerNameA
GetTickCount
Sleep
GetStartupInfoA
CloseHandle
SearchPathA
ResumeThread
VirtualProtect
DeleteCriticalSection
lstrcmpiA
TlsGetValue
AddAtomA
GetDiskFreeSpaceA
GetModuleHandleA
ReleaseMutex
SetEvent
GetLastError
ExitProcess
HeapDestroy
user32
GetKeyState
DispatchMessageA
CopyImage
CreateMenu
CloseWindow
GetScrollBarInfo
EnableWindow
DialogBoxParamA
CopyIcon
IsIconic
DragDetect
CreateWindowExA
GetMessageA
EndDialog
cfgmgr32
CM_Add_Range
CM_Add_IDA
CM_First_Range
CM_Get_Child
CM_Delete_Range
shell32
DragQueryFileA
Sections
.text Size: 1024B - Virtual size: 644B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ