Static task
static1
Behavioral task
behavioral1
Sample
c73f03d3f898a1afc854af1000d1bdf1c6c9ef9430c910828148ca3568d9360c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c73f03d3f898a1afc854af1000d1bdf1c6c9ef9430c910828148ca3568d9360c.exe
Resource
win10v2004-20220812-en
General
-
Target
c73f03d3f898a1afc854af1000d1bdf1c6c9ef9430c910828148ca3568d9360c
-
Size
200KB
-
MD5
7ee2600ccc99b5aa7fc232ebd6bf8234
-
SHA1
6520527bc05703c8d32fc8a33734df535ee03557
-
SHA256
c73f03d3f898a1afc854af1000d1bdf1c6c9ef9430c910828148ca3568d9360c
-
SHA512
c6b3b83699f76a14641958ac53ffc8fd1f00a90e793bdc94e650aa48c8c1ddaf8ae3d61c8e4962bf4927e37082b1f26bb080a7740ddae2a3507f0f88de5aacc0
-
SSDEEP
3072:5i6Kv57dMa3/mp4KOtWUrMpkloLzhtmYdGMps7y4:Q6gdMambHiYdGMpAy4
Malware Config
Signatures
Files
-
c73f03d3f898a1afc854af1000d1bdf1c6c9ef9430c910828148ca3568d9360c.exe windows x86
abaab749c026269cbc56a95733739f56
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ord0
ord0
ord0
ord0
ord0
ord0
ord0
ord0
ord0
ord0
ord0
ord0
ord0
ord0
ord0
ord0
ord0
ord0
ord0
ord0
ord0
ord0
ord0
ord0
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
kernel32
ExitProcess
GetModuleHandleA
Module32Next
LoadResource
Sleep
LoadLibraryA
GetCurrentProcess
GetProcAddress
lstrcat
ReadProcessMemory
GetThreadContext
GetModuleFileNameA
GetEnvironmentVariableA
lstrlen
GetShortPathNameA
ResumeThread
lstrcpy
VirtualAllocEx
FindResourceA
CreateProcessA
Process32Next
Process32First
Module32First
CreateToolhelp32Snapshot
GetTempPathA
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
HeapAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetVersionExA
GetProcessHeap
GetStartupInfoA
RaiseException
RtlUnwind
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
LockResource
GetStdHandle
GetFileType
SetFilePointer
CloseHandle
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
ReadFile
WriteFile
GetConsoleCP
GetConsoleMode
FlushFileBuffers
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
HeapSize
SetStdHandle
CreateFileA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
CreateFileW
SetEndOfFile
user32
MessageBoxA
Sections
.text Size: 124KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE