Static task
static1
Behavioral task
behavioral1
Sample
c21099596d9485ae2739ebca04d8a93e90a4ac33b5fbda95cd1e58a543ac21bf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c21099596d9485ae2739ebca04d8a93e90a4ac33b5fbda95cd1e58a543ac21bf.exe
Resource
win10v2004-20220812-en
General
-
Target
c21099596d9485ae2739ebca04d8a93e90a4ac33b5fbda95cd1e58a543ac21bf
-
Size
107KB
-
MD5
9107d779989e4d98f7649a2a193d87cc
-
SHA1
92bc3da7f3e657c078754136afc4a4a3f443d0ad
-
SHA256
c21099596d9485ae2739ebca04d8a93e90a4ac33b5fbda95cd1e58a543ac21bf
-
SHA512
d7ff1b30976e1ba8d4cfd6eab378f9670864e95da218bb413fd08187de1a7da296d15ababc84e0e7e494bac4c5a6f17359132ff68014d87e83974d3bf593543d
-
SSDEEP
1536:U9vAHxK9lyX4r26q3tkf8mPZePKKTsvkBqJnq2nKHk5m2uqFCj:UOQ9lb7q3SfwPKK484JqQik5NuqFe
Malware Config
Signatures
Files
-
c21099596d9485ae2739ebca04d8a93e90a4ac33b5fbda95cd1e58a543ac21bf.exe windows x86
44d73802c2705542602004e77a16207a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
SetEvent
AddAtomA
CloseHandle
lstrcmpiA
GetDiskFreeSpaceA
PulseEvent
Sleep
HeapDestroy
ResumeThread
GetModuleHandleA
GetTickCount
DeleteCriticalSection
TlsGetValue
GetComputerNameA
ExitProcess
GetStartupInfoA
VirtualProtect
SearchPathA
GetLastError
user32
GetScrollBarInfo
CopyImage
IsIconic
GetMessageA
CreateWindowExA
EndDialog
DragDetect
GetKeyState
DispatchMessageA
CopyIcon
EnableWindow
CloseWindow
DialogBoxParamA
CreateMenu
cfgmgr32
CM_Delete_Range
CM_Get_Child
CM_Add_IDA
CM_Add_Range
CM_First_Range
shell32
DragQueryFileA
Sections
.text Size: 1024B - Virtual size: 648B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 73KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE