Static task
static1
Behavioral task
behavioral1
Sample
c60f4a354a6887d1f0db27621a9725a400e6667eb2aea5a8d370c5a941094630.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c60f4a354a6887d1f0db27621a9725a400e6667eb2aea5a8d370c5a941094630.exe
Resource
win10v2004-20221111-en
General
-
Target
c60f4a354a6887d1f0db27621a9725a400e6667eb2aea5a8d370c5a941094630
-
Size
49KB
-
MD5
361c7979da5304059cffab127720e4af
-
SHA1
57cf7226c02c1bfe5179a5f9b9bc4165b3a0949d
-
SHA256
c60f4a354a6887d1f0db27621a9725a400e6667eb2aea5a8d370c5a941094630
-
SHA512
9c8ebd2825f62af1dfee60e8a05d616a9b9f23873cc64555c3669d330ae57804fd91a49d9895a9d4b36a3fe971b7756f9592de5d4cef38192f534cf88c22c132
-
SSDEEP
768:9+XIUEXO/h/TvvQhRjbacva8F8SlfnGf3XRXiXRXRXRXJXqXIURXIUaXIUEXnXIt:9/UoO/hLQ/Pach1/GyUmULUbUc
Malware Config
Signatures
Files
-
c60f4a354a6887d1f0db27621a9725a400e6667eb2aea5a8d370c5a941094630.exe windows x86
1e36d3b8ba9ab0423be77597ea15d665
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetProcessHeap
SetErrorMode
GetCommandLineA
CreateMutexA
GetLastError
HeapFree
CreateThread
HeapAlloc
ExitProcess
WriteFile
CloseHandle
CreateFileA
lstrlenA
SetFileTime
SetFilePointer
CopyFileA
GetFileTime
lstrcatA
Sleep
FreeLibrary
DeleteFileA
MoveFileExA
GetWindowsDirectoryA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
FindFirstFileA
FindNextFileA
FindClose
ReadFile
GetTickCount
lstrcpyA
GetComputerNameA
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
shell32
ShellExecuteA
ws2_32
setsockopt
htons
send
inet_ntoa
ntohl
closesocket
recv
connect
htonl
bind
socket
WSAStartup
user32
wsprintfA
advapi32
ControlService
ChangeServiceConfigA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
shlwapi
SHSetValueA
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 36B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE