Static task
static1
Behavioral task
behavioral1
Sample
cb67c12dd42b8a3b4ec3168112cf38fad4c40619235e55f9e94a171d1a1e8cfc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb67c12dd42b8a3b4ec3168112cf38fad4c40619235e55f9e94a171d1a1e8cfc.exe
Resource
win10v2004-20220812-en
General
-
Target
cb67c12dd42b8a3b4ec3168112cf38fad4c40619235e55f9e94a171d1a1e8cfc
-
Size
214KB
-
MD5
eb2fcaa1373b432bab9cf925a60890cf
-
SHA1
7929632b5cb20819bc8177a0dbe0e939ae73b84f
-
SHA256
cb67c12dd42b8a3b4ec3168112cf38fad4c40619235e55f9e94a171d1a1e8cfc
-
SHA512
524983e4a1f64662a98cc29f79aa933e559c644847e78b0e88fad68aa344c6d9aeb3ad822753592929cea7baedc0d956529a499b50b939740a309cf027308021
-
SSDEEP
6144:bc5/cYIJNVdRiE7nAjiKUKhBSbVKetpSoJN200avYqasX:I5/cYIJhgE7nIU6y2W
Malware Config
Signatures
Files
-
cb67c12dd42b8a3b4ec3168112cf38fad4c40619235e55f9e94a171d1a1e8cfc.exe windows x86
06893cb80a6e2c8cc7a5364298b08209
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SystemTimeToFileTime
GetOEMCP
SetTimeZoneInformation
AllocConsole
GetEnvironmentStrings
LoadLibraryExW
HeapAlloc
WideCharToMultiByte
SetLastError
IsBadWritePtr
TlsGetValue
CreateDirectoryExW
GetComputerNameW
GetFileAttributesW
SetEnvironmentVariableA
SetHandleCount
GetConsoleTitleW
GetLastError
GetLocaleInfoA
DeleteCriticalSection
LeaveCriticalSection
EnumSystemLocalesA
GetLocaleInfoW
FreeEnvironmentStringsA
EnumResourceTypesA
GetStringTypeA
TlsFree
GetFileType
GetProcAddress
GlobalCompact
GetEnvironmentStringsW
VirtualFree
IsValidLocale
EnterCriticalSection
OpenFileMappingW
GetStringTypeW
VirtualQuery
InitializeCriticalSection
UnhandledExceptionFilter
LCMapStringA
LockResource
GetTimeFormatA
TlsAlloc
GetDateFormatA
HeapReAlloc
HeapSize
ExitProcess
GetPrivateProfileIntA
FormatMessageW
VirtualAlloc
VirtualProtect
QueryPerformanceCounter
GetCurrentProcess
GetVersionExA
GetModuleHandleA
GetCPInfo
GetTimeZoneInformation
GetUserDefaultLCID
GetCurrentThreadId
LCMapStringW
TlsSetValue
CompareStringW
GetCommandLineA
GetCurrentProcessId
GetModuleFileNameA
HeapCreate
CompareStringA
GetWindowsDirectoryA
GetTickCount
GetStdHandle
GetDriveTypeA
GetACP
MultiByteToWideChar
IsValidCodePage
RtlUnwind
FreeEnvironmentStringsW
GetSystemTimeAsFileTime
InterlockedExchange
HeapDestroy
SetThreadIdealProcessor
DebugBreak
GetCurrentThread
WriteFile
GetStartupInfoA
GetSystemInfo
HeapFree
TerminateProcess
LoadLibraryA
WaitForSingleObjectEx
user32
SetCursor
DlgDirSelectComboBoxExA
EnumDisplayDevicesA
SetWindowRgn
SetUserObjectInformationW
MapVirtualKeyExW
CloseClipboard
LoadMenuIndirectW
GetUserObjectSecurity
EqualRect
CharNextExA
advapi32
RegOpenKeyExA
CryptSetProviderA
CryptGenRandom
CryptImportKey
CryptEncrypt
CreateServiceW
CryptHashData
CryptGetKeyParam
CryptVerifySignatureA
LogonUserA
wininet
GopherOpenFileA
GetUrlCacheConfigInfoA
UpdateUrlCacheContentPath
HttpSendRequestExW
InternetTimeFromSystemTime
InternetTimeToSystemTimeA
GetUrlCacheHeaderData
InternetCheckConnectionW
HttpCheckDavCompliance
GetUrlCacheEntryInfoExA
ResumeSuspendedDownload
InternetGetConnectedStateEx
GetUrlCacheEntryInfoA
InternetOpenW
InternetConnectA
FindFirstUrlCacheEntryW
InternetAlgIdToStringW
InternetCreateUrlA
InternetAlgIdToStringA
Sections
.text Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ