Static task
static1
Behavioral task
behavioral1
Sample
cb769d306834121f66196ec70d98d0247bdd99a2073e988012a64dcab989a1c7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb769d306834121f66196ec70d98d0247bdd99a2073e988012a64dcab989a1c7.exe
Resource
win10v2004-20220812-en
General
-
Target
cb769d306834121f66196ec70d98d0247bdd99a2073e988012a64dcab989a1c7
-
Size
393KB
-
MD5
841e3996223e702475e17250c4d31601
-
SHA1
e01f0d99a3bfe56911c03bd5caea80c827064faf
-
SHA256
cb769d306834121f66196ec70d98d0247bdd99a2073e988012a64dcab989a1c7
-
SHA512
2bab16e21d0e6573e988a8426d592a92842d24f393ca9ce491f94d5b5c31ef4636b299a93fb11f4c1d609099480a6aceee92d5d1c7970a52332b1539d59a5f9d
-
SSDEEP
6144:RxOsqh1dTk3NpvxbkZeB/73LWt4mr7qOv2plE2l0NI3Xg4gKozZOzIOx4mv1iCnS:PWhEZL7maOv2p20Ngj8LbnkyhqdpFz
Malware Config
Signatures
Files
-
cb769d306834121f66196ec70d98d0247bdd99a2073e988012a64dcab989a1c7.exe windows x86
b656a12e5916fa47302e17cdf135f46f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHFileOperation
RealShellExecuteW
gdi32
GetBkMode
RemoveFontResourceW
IntersectClipRect
GetROP2
TranslateCharsetInfo
SetLayout
CreateColorSpaceW
FixBrushOrgEx
GetRandomRgn
SetMiterLimit
EndPath
GetEnhMetaFileHeader
ExtCreatePen
SetColorAdjustment
GetWindowExtEx
LPtoDP
CreateMetaFileW
PolyBezierTo
GetPaletteEntries
advapi32
RegLoadKeyA
LookupPrivilegeValueW
InitiateSystemShutdownW
RegEnumValueW
CryptAcquireContextW
CryptGetHashParam
LookupPrivilegeDisplayNameW
comctl32
InitCommonControlsEx
kernel32
SetEnvironmentVariableA
GetStringTypeW
FindNextFileA
RtlUnwind
UnhandledExceptionFilter
InitializeCriticalSection
WriteFile
GetStdHandle
HeapCreate
GetConsoleOutputCP
EnumResourceLanguagesW
SetConsoleCtrlHandler
ReadFile
HeapReAlloc
GetSystemTimeAsFileTime
TlsAlloc
GetCommandLineW
MultiByteToWideChar
SetUnhandledExceptionFilter
CreateMutexA
HeapAlloc
HeapFree
WideCharToMultiByte
GetProcAddress
FlushFileBuffers
Sleep
GetProcessHeap
IsDebuggerPresent
GetModuleHandleA
GetLocaleInfoA
GetFileTime
GetOEMCP
SetLastError
GetTimeZoneInformation
GetConsoleCP
CompareStringW
GetStringTypeA
InterlockedIncrement
GetTickCount
VirtualQuery
GetEnvironmentStringsW
EnumSystemLocalesA
GetModuleFileNameA
GetUserDefaultLCID
FindResourceExA
OpenMutexA
WriteConsoleW
GetACP
EnterCriticalSection
GetFileType
TlsSetValue
WriteConsoleA
VirtualAlloc
GetConsoleMode
GetTimeFormatA
TlsGetValue
GetStartupInfoA
GetCurrentThread
SetFilePointer
GetCurrentProcess
GetLastError
TerminateProcess
TlsFree
InterlockedExchange
GetLocaleInfoW
IsValidCodePage
DeleteCriticalSection
ExitProcess
LeaveCriticalSection
GetCPInfo
IsValidLocale
HeapSize
CompareStringA
GetCurrentThreadId
GetCommandLineA
FreeEnvironmentStringsW
FreeLibrary
HeapDestroy
LCMapStringW
SetStdHandle
CreateFileA
QueryPerformanceCounter
LCMapStringA
VirtualFree
InterlockedDecrement
CloseHandle
FreeEnvironmentStringsA
LoadLibraryA
GetVersionExA
GetCurrentProcessId
GetDateFormatA
GetEnvironmentStrings
SetHandleCount
user32
GetWindowLongA
RegisterClassA
CheckRadioButton
GrayStringW
GetWindow
TrackPopupMenu
CopyIcon
GetWindowLongW
ActivateKeyboardLayout
IsCharLowerA
MessageBoxExW
EndDialog
CharPrevA
GetMenuItemInfoA
InvalidateRgn
DrawFocusRect
RealChildWindowFromPoint
RegisterClassExA
EnumWindowStationsA
MsgWaitForMultipleObjectsEx
GetWindowThreadProcessId
SetDeskWallpaper
Sections
.text Size: 202KB - Virtual size: 201KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ