Static task
static1
Behavioral task
behavioral1
Sample
c906853df3ee3d56e4afa14abe684419a39bc60faf79648a179c7d1c146f1dd9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c906853df3ee3d56e4afa14abe684419a39bc60faf79648a179c7d1c146f1dd9.exe
Resource
win10v2004-20220812-en
General
-
Target
c906853df3ee3d56e4afa14abe684419a39bc60faf79648a179c7d1c146f1dd9
-
Size
325KB
-
MD5
165c78842da0db5a5e430ecf850f467e
-
SHA1
4323c8642454fa0918084dd99b3ba9d7465ff75e
-
SHA256
c906853df3ee3d56e4afa14abe684419a39bc60faf79648a179c7d1c146f1dd9
-
SHA512
153105f353151656bc6b90b514c9f7f1e2ffd4d2bde4e53256c1b408d4511e7ec7c54e3bb1acab912032b528c9e2ce0e9ef82c53fa149eafc38af252cf6a6635
-
SSDEEP
6144:zN/I+n0Q1M9VMgb/bDPzTlc0XMOvx8LAMOykqc6Fg9T:x/TdMXbvLTJTvx8EFx/6
Malware Config
Signatures
Files
-
c906853df3ee3d56e4afa14abe684419a39bc60faf79648a179c7d1c146f1dd9.exe windows x86
3ee2caf1a326440d4c2436e2e71cd235
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
SetFilePointer
TlsFree
MapViewOfFile
RaiseException
GetCurrentThread
InterlockedCompareExchange
GetCommandLineA
HeapSize
GetCPInfo
LockResource
GetCurrentProcessId
GetEnvironmentStrings
CreateProcessW
lstrlenW
VirtualQuery
GlobalUnlock
GetEnvironmentStringsW
GetThreadLocale
FindNextFileW
LCMapStringA
FindResourceW
GetConsoleCP
GlobalFree
lstrlenA
HeapCreate
SetStdHandle
GetLastError
LeaveCriticalSection
ExitProcess
CreateFileA
TlsSetValue
GetFileType
CreateFileW
GetProcAddress
FindFirstFileW
CreateFileMappingA
CompareStringA
GetDiskFreeSpaceA
FindFirstFileA
lstrcmpA
CompareStringW
GetProcessHeap
GetSystemInfo
WaitForMultipleObjects
SetEvent
GetEnvironmentVariableA
GetModuleHandleW
CreateDirectoryA
LCMapStringW
GetFileSize
GetStartupInfoA
DeleteFileA
LoadLibraryA
FlushFileBuffers
VirtualProtect
TlsAlloc
GetTickCount
QueryPerformanceCounter
FreeLibrary
LoadLibraryW
SetHandleCount
CloseHandle
HeapFree
WriteConsoleW
InterlockedIncrement
GetVersion
SetEndOfFile
GetConsoleMode
GlobalAlloc
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
SetUnhandledExceptionFilter
CreateThread
GetModuleHandleA
CreateMutexA
MultiByteToWideChar
UnhandledExceptionFilter
LoadLibraryExA
GetModuleFileNameA
GetVersionExA
HeapAlloc
IsDebuggerPresent
GetModuleFileNameW
InterlockedDecrement
SetLastError
OutputDebugStringA
FormatMessageA
TlsGetValue
FindClose
GlobalLock
LoadResource
InitializeCriticalSection
LocalFree
GetOEMCP
GetFullPathNameA
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
WriteFile
GetStringTypeA
WideCharToMultiByte
lstrcmpiA
GetTempPathA
FreeEnvironmentStringsW
ExpandEnvironmentStringsA
LocalAlloc
GetLocaleInfoA
GetCurrentDirectoryA
GetCurrentProcess
DeleteCriticalSection
FreeEnvironmentStringsA
GetLocalTime
GetFileAttributesW
HeapDestroy
FindNextFileA
GetDriveTypeA
WaitForSingleObject
GetFileAttributesA
FileTimeToSystemTime
ReleaseMutex
GetConsoleOutputCP
GetStdHandle
lstrcpynA
GetACP
GetCurrentThreadId
InterlockedExchange
SizeofResource
CreateProcessA
UnmapViewOfFile
VirtualFree
Sleep
FindResourceA
EnterCriticalSection
VirtualAlloc
user32
SetWindowLongA
SetCapture
GetWindowRect
GetSystemMetrics
MapWindowPoints
KillTimer
BeginPaint
SetFocus
EndPaint
FillRect
CreateWindowExA
GetWindowLongA
EnableMenuItem
LoadStringA
GetWindow
IsWindowEnabled
TranslateMessage
SetWindowPos
PeekMessageA
EnableWindow
ShowWindow
SetWindowTextA
UpdateWindow
GetParent
GetMessageA
DestroyWindow
GetKeyState
ScreenToClient
SendMessageA
ReleaseDC
GetCursorPos
GetDC
SetForegroundWindow
DispatchMessageA
PostQuitMessage
LoadCursorA
TrackPopupMenu
GetDesktopWindow
EndDialog
MessageBoxA
GetSysColor
IsWindowVisible
GetSubMenu
GetDlgItem
DefWindowProcA
GetFocus
InvalidateRect
GetClientRect
CallWindowProcA
SetCursor
ClientToScreen
gdi32
GetDeviceCaps
SetTextColor
CreateCompatibleDC
SetBkColor
SetBkMode
CreateSolidBrush
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
advapi32
RegCreateKeyExA
RegDeleteValueA
RegSetValueExA
RegOpenKeyExA
msvcrt
_exit
exit
_cexit
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 303KB - Virtual size: 302KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ