Static task
static1
Behavioral task
behavioral1
Sample
cb7cc5ced374727d296b14aa6a3d43d1f5a5a3b0911ed1a35dfa1dd85ef41177.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb7cc5ced374727d296b14aa6a3d43d1f5a5a3b0911ed1a35dfa1dd85ef41177.exe
Resource
win10v2004-20220812-en
General
-
Target
cb7cc5ced374727d296b14aa6a3d43d1f5a5a3b0911ed1a35dfa1dd85ef41177
-
Size
461KB
-
MD5
ec26aafc8bed900f6921349e12c5ba47
-
SHA1
3e22f9b248ae300fd9ee6d32a040073f75b60f7e
-
SHA256
cb7cc5ced374727d296b14aa6a3d43d1f5a5a3b0911ed1a35dfa1dd85ef41177
-
SHA512
078fb4805ae815ea11782522fd309940d00eddd0a091db2922f7305a452df585544bbcd7bfaaca4448f1620ac192de1fe0932e83eb3a86d4820bcb2f50c0291a
-
SSDEEP
12288:MeVC8Lv5K5viR5r5IlpkkVNANLCPlr8eqaE2Fp/lY:VVC6R5bQuClrxqN2/
Malware Config
Signatures
Files
-
cb7cc5ced374727d296b14aa6a3d43d1f5a5a3b0911ed1a35dfa1dd85ef41177.exe windows x86
7a1189abc2d4af33c149c8fe8696788e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
RectVisible
CreateColorSpaceA
advapi32
CryptSetProviderExW
RegCreateKeyExA
shell32
SHFileOperation
CommandLineToArgvW
DoEnvironmentSubstW
SHGetNewLinkInfo
SHFormatDrive
DragAcceptFiles
user32
DdeSetQualityOfService
GetMenuCheckMarkDimensions
ValidateRgn
MessageBoxIndirectA
UnionRect
MoveWindow
kernel32
HeapDestroy
WaitNamedPipeW
GetVersionExA
CompareStringA
LCMapStringA
GetFileType
ExitProcess
TlsSetValue
lstrcmpiA
GetNamedPipeHandleStateA
GetLastError
IsValidLocale
TlsAlloc
GetProcAddress
VirtualQuery
IsValidCodePage
TlsFree
GetCurrentThread
WriteFile
CreateNamedPipeW
WritePrivateProfileSectionA
DeleteCriticalSection
GetUserDefaultLCID
InitializeCriticalSection
EnterCriticalSection
GetModuleFileNameA
GetProcessShutdownParameters
GetStringTypeW
LoadLibraryA
GetModuleFileNameW
GetCurrentProcessId
GetStdHandle
GetDateFormatA
FreeEnvironmentStringsA
QueryPerformanceCounter
UnhandledExceptionFilter
GetModuleHandleA
GetLocaleInfoA
GetSystemTimeAsFileTime
GetEnvironmentStrings
FreeEnvironmentStringsW
InterlockedExchangeAdd
CompareStringW
LCMapStringW
SetLastError
GetSystemInfo
GetTimeFormatA
GetCurrentThreadId
SetHandleCount
InterlockedExchange
GetCPInfo
GetTimeZoneInformation
TlsGetValue
WideCharToMultiByte
GetStringTypeA
GetLocaleInfoW
MultiByteToWideChar
LeaveCriticalSection
HeapSize
FoldStringA
VirtualFree
GetACP
VirtualAlloc
GetCurrentProcess
EnumSystemLocalesA
HeapFree
SetConsoleMode
RtlUnwind
HeapAlloc
WritePrivateProfileStructW
GetCommandLineW
OpenSemaphoreA
IsBadWritePtr
GetSystemDefaultLangID
GetStartupInfoA
SetEnvironmentVariableA
CreateSemaphoreA
GetStartupInfoW
GetOEMCP
HeapCreate
HeapReAlloc
GetEnvironmentStringsW
VirtualProtect
SetCurrentDirectoryA
TerminateProcess
WritePrivateProfileSectionW
GetCommandLineA
GetTickCount
comdlg32
GetOpenFileNameA
ChooseFontA
ReplaceTextA
GetOpenFileNameW
ChooseColorW
GetFileTitleA
GetFileTitleW
ChooseColorA
FindTextW
PrintDlgW
PageSetupDlgA
Sections
.text Size: 141KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 308KB - Virtual size: 308KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ