Static task
static1
Behavioral task
behavioral1
Sample
c797df8f65627c94fac30ba0c984ea3f9fcaa72d8ac00bdb14e9abaf24819fc3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c797df8f65627c94fac30ba0c984ea3f9fcaa72d8ac00bdb14e9abaf24819fc3.exe
Resource
win10v2004-20221111-en
General
-
Target
c797df8f65627c94fac30ba0c984ea3f9fcaa72d8ac00bdb14e9abaf24819fc3
-
Size
38KB
-
MD5
acf7f4eaf7afd56aa165ca54ab7488d2
-
SHA1
ef5a525ef0a059098b05b1d75c04cbc9810d9d8b
-
SHA256
c797df8f65627c94fac30ba0c984ea3f9fcaa72d8ac00bdb14e9abaf24819fc3
-
SHA512
3866231a1f57aee7b058b69da5c2b27279dd75c980647ab8afaaf76849da3c9c9f263b82921065da6f6748a4f5a1a3f91e314cc9ec4c02fe63f14099e2baad19
-
SSDEEP
768:W/9SSas+vmeLswcpS1iqyPY1RNwFpVK51q1vujDUycYG:W/9SSivh1iqGi6eV7G
Malware Config
Signatures
Files
-
c797df8f65627c94fac30ba0c984ea3f9fcaa72d8ac00bdb14e9abaf24819fc3.exe windows x86
1a077a0e1f858258eb2ecd1beba2f4c2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_wfopen
fwprintf
fclose
strtok
realloc
wcscpy
free
malloc
_wcsicmp
memcpy
strcpy
mbstowcs
wcstombs
strlen
srand
_vsnwprintf
wprintf
_vsnprintf
printf
atoi
strncpy
memset
_snwprintf
wcscmp
rand
strncmp
strstr
_snprintf
wcsstr
strcmp
kernel32
GetLogicalDriveStringsW
FindFirstFileW
CopyFileW
CreateDirectoryW
CreateEventW
lstrlenW
TerminateProcess
CreateProcessW
SetErrorMode
GetModuleHandleW
GetModuleFileNameW
GetDriveTypeW
ExitThread
ExitProcess
FindResourceW
SizeofResource
LoadResource
LockResource
GetCurrentProcessId
VirtualAlloc
GetCurrentProcess
HeapFree
ExpandEnvironmentStringsW
HeapAlloc
CloseHandle
Process32NextW
DeleteFileW
MoveFileW
SetFileAttributesW
Sleep
Process32FirstW
CreateToolhelp32Snapshot
lstrlenA
SetThreadPriority
GetLastError
CreateThread
GetLocaleInfoA
TerminateThread
GetModuleFileNameA
GetModuleHandleA
GetTimeFormatA
GetTimeFormatW
OutputDebugStringA
OutputDebugStringW
ReleaseMutex
WaitForSingleObject
WriteFile
CreateFileW
GetTickCount
SetLastError
FindNextFileW
FindNextFileA
OpenProcess
GetProcAddress
LoadLibraryW
GetFileAttributesW
GetVersionExA
ReadFile
GetFileSize
CreateMutexW
OpenMutexW
GetProcessHeap
CreateRemoteThread
WriteProcessMemory
VirtualProtectEx
VirtualAllocEx
ReadProcessMemory
ws2_32
WSAStartup
closesocket
connect
sendto
htons
socket
WSACleanup
gethostbyname
send
recv
inet_addr
shlwapi
PathAppendW
wininet
InternetOpenW
InternetCloseHandle
InternetOpenUrlA
InternetReadFile
ole32
CoUninitialize
CoCreateInstance
CoInitialize
psapi
GetModuleFileNameExW
shell32
ShellExecuteA
SHGetFolderPathW
advapi32
GetUserNameW
RegNotifyChangeKeyValue
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCreateKeyExW
RegDeleteValueW
RegCloseKey
Sections
.data Size: 30KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 384B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ