Static task
static1
Behavioral task
behavioral1
Sample
c64b0f367b75e6c76c64a10514405876.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c64b0f367b75e6c76c64a10514405876.exe
Resource
win10v2004-20231215-en
General
-
Target
c64b0f367b75e6c76c64a10514405876
-
Size
457KB
-
MD5
c64b0f367b75e6c76c64a10514405876
-
SHA1
1724151245b3b9991de6e28ce09e9fc514c7db16
-
SHA256
45b3b3d3a7c432f267c4a2a72e99326a5d892129b7d6bd0f6cb89c288005b098
-
SHA512
7b5ec6f0629b527cef31fb43ce32b7681d1314d85c665587aa0bbc9f5c682fa12b1734c49a91cb5a7c9ccc43f87b42db9afa5001cdb589e0019d446d0d657e39
-
SSDEEP
12288:iISeSjcA3z0+eW6Cxfhgs4BiWHXgq9ggr:UDl0yxmliWgUggr
Malware Config
Signatures
Files
-
c64b0f367b75e6c76c64a10514405876.exe windows:4 windows x86 arch:x86
7550a75d9176532365d416434cf05a41
Code Sign
8c:40:5f:fa:ce:72:b8:a9:4c:55:b1:b5:8a:59:b6:67:6e:31:ef:29Signer
Actual PE Digest8c:40:5f:fa:ce:72:b8:a9:4c:55:b1:b5:8a:59:b6:67:6e:31:ef:29Digest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_DrawEx
ImageList_Remove
ImageList_BeginDrag
ImageList_Create
ord17
version
VerQueryValueW
wininet
HttpEndRequestA
kernel32
LockResource
WriteFile
GetLastError
CreateFileMappingA
CloseHandle
FileTimeToDosDateTime
EnumCalendarInfoA
CreateEventA
CompareStringA
FreeResource
GetCommandLineA
SetStdHandle
SetFilePointer
SetEndOfFile
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
HeapAlloc
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
GetModuleHandleW
ReadFile
CreateFileA
VirtualAlloc
ExitProcess
GetVersionExA
GetVersion
GetSystemTimeAsFileTime
GetCommandLineW
CreateThread
GetModuleHandleA
GetProcAddress
FlushFileBuffers
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapFree
GetStartupInfoA
user32
RegisterClassW
GetDC
MessageBoxA
GetSystemMetrics
CreateDialogParamA
CreateWindowExA
GetWindowThreadProcessId
IntersectRect
GetCapture
GetClassInfoA
GetSystemMenu
CharNextA
LoadStringA
GetClientRect
DialogBoxParamA
gdi32
ExcludeClipRect
SetBkColor
SelectPalette
SetBrushOrgEx
SetEnhMetaFileBits
SetPixel
SetROP2
StretchBlt
UnrealizeObject
CreatePalette
GetDeviceCaps
Rectangle
advapi32
RegSetValueExW
RegCloseKey
RegCreateKeyExA
GetUserNameA
shell32
StrStrIA
ole32
CoUninitialize
CoTaskMemAlloc
oleaut32
SafeArrayGetLBound
SafeArrayRedim
SafeArrayGetUBound
SafeArrayPutElement
SafeArrayCreate
SysAllocStringLen
SysReAllocStringLen
Sections
.text Size: 408KB - Virtual size: 404KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.Cdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ