Static task
static1
Behavioral task
behavioral1
Sample
cf347181887214fe75d956a52b77dcd4845565026ca4ddde9e17d23675497c0e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cf347181887214fe75d956a52b77dcd4845565026ca4ddde9e17d23675497c0e.exe
Resource
win10v2004-20220812-en
General
-
Target
cf347181887214fe75d956a52b77dcd4845565026ca4ddde9e17d23675497c0e
-
Size
59KB
-
MD5
6e2bcdad9babdaa82da3224d7df3dd1a
-
SHA1
71d4fb0ab264d2b08485fce9b4ab632df371ccc7
-
SHA256
cf347181887214fe75d956a52b77dcd4845565026ca4ddde9e17d23675497c0e
-
SHA512
e277c2ee5838706620e9346b57c138544049f97a4b0be39d7cb6b373997e944387d548848fdf4191caeef0050642b001035e415a4e76dc1a7473e50293e58637
-
SSDEEP
1536:tgzC/ewoka3k3UzpjrVPY/xvFzLgsHvBvt2whkDm4zA/:tgzCyka3k3UzpjrVPY/ZFzLTZcwhkzc
Malware Config
Signatures
Files
-
cf347181887214fe75d956a52b77dcd4845565026ca4ddde9e17d23675497c0e.exe windows x86
6c6f53021da62e0aa44d4671a8bfeb7c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyExA
RegSetValueExA
RegCloseKey
kernel32
CloseHandle
CopyFileA
CreateFileA
DeleteFileA
ExitProcess
FindResourceA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
LoadResource
LockResource
OpenProcess
SizeofResource
WaitForSingleObject
WinExec
WriteFile
WriteProcessMemory
lstrcatA
lstrcmpiA
CreateRemoteThread
GetCurrentProcessId
VirtualFree
SetLastError
VirtualAlloc
ReadProcessMemory
ResumeThread
user32
GetWindowThreadProcessId
FindWindowA
Sections
.text Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RT Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE