Static task
static1
Behavioral task
behavioral1
Sample
cd5197e7e1d1de39b06f756a0e948769dda7b5e7b82bd761199cd0e77485487e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cd5197e7e1d1de39b06f756a0e948769dda7b5e7b82bd761199cd0e77485487e.exe
Resource
win10v2004-20220901-en
General
-
Target
cd5197e7e1d1de39b06f756a0e948769dda7b5e7b82bd761199cd0e77485487e
-
Size
264KB
-
MD5
1cb7ceaad1424f131954460252652b44
-
SHA1
121053315d273fba1f2ae7226e4d06a1b2f39b6e
-
SHA256
cd5197e7e1d1de39b06f756a0e948769dda7b5e7b82bd761199cd0e77485487e
-
SHA512
11d9fb79a2fde646da0daef54dd91d2b28103d9d51d5f6606c536f81c56546b826171f94455a9a6dde8a394e0322d468f51d01273cecda73e0d30069dd5f8d7a
-
SSDEEP
3072:jIOqZKt8TLpdmdILfIeAi6ehQhzFPLPXizUbibopULsMGXRair5FkdhC4EVvdPfk:kPKmRdrIjeiMUjBaYWOTe6CkDKa8Z
Malware Config
Signatures
Files
-
cd5197e7e1d1de39b06f756a0e948769dda7b5e7b82bd761199cd0e77485487e.exe windows x86
092e50c82a68fe1bb9c6d85744f14b40
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
strcmp
sprintf
strcpy
strlen
rand
wcslen
_wcsicmp
memcpy
_strnicmp
printf
strrchr
strcat
strstr
memset
kernel32
GetProcessHeap
GetStartupInfoA
LoadLibraryA
lstrcmpiA
FreeLibrary
VirtualAllocEx
GetModuleHandleA
GetProcAddress
CreateRemoteThread
LocalAlloc
GetVolumeInformationA
CopyFileA
WinExec
GetLocalTime
MultiByteToWideChar
GetSystemDirectoryA
GetFileSize
CreateFileMappingA
MapViewOfFile
ReadProcessMemory
UnmapViewOfFile
VirtualQueryEx
VirtualProtectEx
WriteProcessMemory
ResumeThread
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
Sleep
CloseHandle
WriteFile
CreateFileA
GetLastError
CreateThread
HeapFree
HeapAlloc
OpenProcess
WideCharToMultiByte
TerminateThread
WaitForSingleObject
GetCurrentProcessId
lstrlenA
Process32Next
Process32First
CreateToolhelp32Snapshot
DuplicateHandle
VirtualProtect
user32
CharUpperA
advapi32
QueryServiceConfigA
ChangeServiceConfigA
CreateServiceA
OpenSCManagerA
OpenServiceA
StartServiceA
CloseServiceHandle
SetServiceStatus
RegCreateKeyExA
RegSetValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
netapi32
NetScheduleJobAdd
ntdll
NtQueryInformationFile
NtQuerySystemInformation
Sections
.text Size: - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 320B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bad0 Size: - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.bad1 Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE