Static task
static1
Behavioral task
behavioral1
Sample
c32c47564314cfacd5c13a40b7b044f1df5290a8fef09b7f6fef2d0b2d350cba.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c32c47564314cfacd5c13a40b7b044f1df5290a8fef09b7f6fef2d0b2d350cba.exe
Resource
win10v2004-20221111-en
General
-
Target
c32c47564314cfacd5c13a40b7b044f1df5290a8fef09b7f6fef2d0b2d350cba
-
Size
374KB
-
MD5
8b4861ac47972cf845a766482cc32b89
-
SHA1
1aebd9c76d36c1980ea9161ab4a63d85666f7e43
-
SHA256
c32c47564314cfacd5c13a40b7b044f1df5290a8fef09b7f6fef2d0b2d350cba
-
SHA512
29f3c86402d7f5c09740b00a9e91e40a0347ddb7d3cade3e502c0fd08290ec5f557b67826e82f1d3d202fa76bfe02edcfd84bd42449326f1e7b392c8706a03f3
-
SSDEEP
6144:G5rLyqpjgXwELvv+N5ImaePJnKDbBuvRhPixNoswzjwkB2TB8rESh:6LyqpcXwELvv+nImXnKD+hPuo9nqFGES
Malware Config
Signatures
Files
-
c32c47564314cfacd5c13a40b7b044f1df5290a8fef09b7f6fef2d0b2d350cba.exe windows x86
a7b012d9c6705a9d9272f24cb83dcc55
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryMultipleValuesA
CryptImportKey
StartServiceA
RegSetValueExW
CryptContextAddRef
RegFlushKey
RegReplaceKeyA
RegSetValueW
AbortSystemShutdownA
LookupPrivilegeValueA
RegRestoreKeyW
wininet
SetUrlCacheEntryInfoW
InternetGoOnlineA
InternetWriteFileExW
FtpGetFileA
SetUrlCacheGroupAttributeW
CreateUrlCacheContainerA
FtpGetFileW
InternetCloseHandle
comdlg32
GetFileTitleA
kernel32
RtlUnwind
EnumSystemCodePagesA
GetCurrentThreadId
GetComputerNameA
CloseHandle
HeapSize
SetLastError
TlsGetValue
GetProcAddress
GetLastError
GetOEMCP
GetCurrentProcessId
GetStdHandle
TlsFree
GetSystemInfo
CompareStringA
FlushFileBuffers
HeapCreate
GetCommandLineA
OpenMutexA
ReadConsoleOutputW
GetCommandLineW
GetStringTypeA
GetDateFormatA
ResumeThread
GetLocaleInfoA
GetLocaleInfoW
MultiByteToWideChar
EnterCriticalSection
InitializeCriticalSection
LCMapStringA
GetUserDefaultLCID
SetHandleCount
UnhandledExceptionFilter
FreeEnvironmentStringsA
EnumSystemLocalesA
GetStringTypeW
HeapFree
GetModuleFileNameA
GetStartupInfoW
HeapDestroy
TerminateProcess
DeleteCriticalSection
VirtualFree
GetSystemTimeAsFileTime
CompareStringW
TlsAlloc
GetProcessAffinityMask
VirtualProtect
GetLogicalDriveStringsA
GetACP
SetEnvironmentVariableA
ReadFile
IsValidCodePage
GetModuleFileNameW
GetCurrentThread
GetAtomNameA
GetTimeFormatA
WriteFile
RemoveDirectoryA
SetStdHandle
GetTimeZoneInformation
GetCurrentProcess
HeapReAlloc
IsValidLocale
GetEnvironmentStrings
InterlockedExchange
ExitProcess
CreateMutexA
QueryPerformanceCounter
VirtualQuery
TlsSetValue
GetTickCount
lstrcmpiA
FreeEnvironmentStringsW
GetModuleHandleA
GetVersionExA
GetFileType
LeaveCriticalSection
GetEnvironmentStringsW
VirtualAlloc
LCMapStringW
GetStartupInfoA
SetFilePointer
DebugActiveProcess
LoadLibraryA
WideCharToMultiByte
HeapAlloc
IsBadWritePtr
GetCPInfo
comctl32
InitCommonControlsEx
user32
GetSysColor
SendNotifyMessageA
GetKBCodePage
GrayStringA
IntersectRect
LoadCursorFromFileA
SystemParametersInfoW
CascadeWindows
RegisterClassExA
EndDialog
RegisterClassA
RegisterClipboardFormatW
SendMessageW
DdeCreateStringHandleA
CharLowerA
DrawEdge
DdeCreateStringHandleW
SwitchToThisWindow
Sections
.text Size: 179KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 174KB - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ