Static task
static1
Behavioral task
behavioral1
Sample
c7cb95448cffecd405bd4b2a81336016e2bdde2fc1c32c6e308faff350408acf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c7cb95448cffecd405bd4b2a81336016e2bdde2fc1c32c6e308faff350408acf.exe
Resource
win10v2004-20221111-en
General
-
Target
c7cb95448cffecd405bd4b2a81336016e2bdde2fc1c32c6e308faff350408acf
-
Size
79KB
-
MD5
98baf99f7289b540fd6bdbc6fea58e2a
-
SHA1
9354c7439f633fe92b72e61ae3e6fd44f2c1754b
-
SHA256
c7cb95448cffecd405bd4b2a81336016e2bdde2fc1c32c6e308faff350408acf
-
SHA512
94cdf4ce569526dadca3b58a069a0971c980be14dd3766e6256209919873d6d0d04a9d0018787622413708fa936eb518dfc5ba772bbfb0625f36b43b4bb3c142
-
SSDEEP
1536:Lvb/2e9p3ebCPgW97HfBrxvqhezIZ71hhXLRQ9SOzFNZmamCWUX8ksDr:/2e91FP19DBtuezIFZKXY/
Malware Config
Signatures
Files
-
c7cb95448cffecd405bd4b2a81336016e2bdde2fc1c32c6e308faff350408acf.exe windows x86
1ea28dc54839822b39b8feb69a1a467d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
ntdll
RtlUnwind
user32
MessageBoxA
LoadStringA
FindWindowA
SendMessageA
wsprintfA
LoadIconA
ExitWindowsEx
kernel32
DeleteFileA
WaitForSingleObject
SetFileAttributesA
MapViewOfFile
GetFileType
FreeLibrary
CreateFileA
GetFileSize
CloseHandle
CreateDirectoryA
RemoveDirectoryA
GetCommandLineA
FindNextFileA
GetCurrentProcessId
GlobalAlloc
GetShortPathNameA
SetEndOfFile
lstrcpyA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GlobalFree
InterlockedExchange
MoveFileExA
CreateFileMappingA
GetVersionExA
SetFilePointer
GetProcAddress
GetPrivateProfileStringA
InterlockedCompareExchange
GetExitCodeProcess
FindClose
GetLastError
VirtualProtect
GetTickCount
GetStartupInfoA
GetWindowsDirectoryA
CreateProcessA
GetSystemTimeAsFileTime
lstrlenA
UnmapViewOfFile
LoadLibraryA
TerminateProcess
QueryPerformanceCounter
FindFirstFileA
GetModuleHandleA
lstrcatA
GetSystemDirectoryA
CreateFileW
GetCurrentProcess
Sleep
GetCurrentThreadId
lstrcpynA
msvcrt
__set_app_type
__p__commode
_controlfp
strtok
_cexit
_access
memset
_initterm
_mbscmp
memcpy
_amsg_exit
__getmainargs
memmove
__p__fmode
strstr
_mbschr
_getcwd
?terminate@@YAXXZ
_ismbblead
_acmdln
_mbsinc
__setusermatherr
_XcptFilter
_exit
_mbsupr
exit
_adjust_fdiv
_mbsstr
_mbsicmp
strchr
malloc
setupapi
SetupDiDeleteDeviceInfo
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiOpenDevRegKey
SetupDiCallClassInstaller
advapi32
RegDeleteValueA
RegSetValueExA
RegEnumKeyExA
LookupPrivilegeValueA
AllocateAndInitializeSid
OpenProcessToken
GetTokenInformation
DeleteService
RegDeleteKeyA
OpenServiceA
AdjustTokenPrivileges
RegOpenKeyExA
FreeSid
OpenSCManagerA
ControlService
EqualSid
RegCloseKey
CloseServiceHandle
RegQueryValueExA
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ