Static task
static1
Behavioral task
behavioral1
Sample
c4c8fffa93afbfab890908ec96275b37b25d581cb57682f0f474f98121ffcfe9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c4c8fffa93afbfab890908ec96275b37b25d581cb57682f0f474f98121ffcfe9.exe
Resource
win10v2004-20221111-en
General
-
Target
c4c8fffa93afbfab890908ec96275b37b25d581cb57682f0f474f98121ffcfe9
-
Size
26KB
-
MD5
eff1bdfba619d0db4f9f4c6ec04b8ece
-
SHA1
804e60c722d8fdb656670072a82f091149ecee94
-
SHA256
c4c8fffa93afbfab890908ec96275b37b25d581cb57682f0f474f98121ffcfe9
-
SHA512
002e853e9c98e55413b8d0da2efab0797f3b90c3a2ea7f4f02c2191ff670e1f4ae8a8dfc82110d59071d8271f20d9a02dd487808efdf200df1f9418ff6af39d2
-
SSDEEP
384:9OrVzAU4kBcEep0L5kddWRkbX6UzO+tNj4Jx04T4ZcZRrzLfDh9F/LJP4Xj9ZYdy:sVMTesQkdd1rrFcnT4ZcvXnh9FDJq9MU
Malware Config
Signatures
Files
-
c4c8fffa93afbfab890908ec96275b37b25d581cb57682f0f474f98121ffcfe9.exe windows x86
417ddd16c7ab160daed3266bbc082864
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
CreateProcessW
GetModuleHandleA
GetVersionExA
ExitProcess
GetProcAddress
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
GetModuleFileNameW
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LoadLibraryA
HeapAlloc
VirtualAlloc
HeapReAlloc
CompareStringA
WideCharToMultiByte
CompareStringW
SetEnvironmentVariableA
SetEnvironmentVariableW
RtlUnwind
VirtualProtect
GetSystemInfo
VirtualQuery
GetLocaleInfoA
GetCPInfo
GetStringTypeA
GetStringTypeW
user32
MessageBoxW
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE