Static task
static1
Behavioral task
behavioral1
Sample
cb862461b4a86dd4c75533056a16139fb4448dceb31db5c4d4d2a8a1a367f5f6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb862461b4a86dd4c75533056a16139fb4448dceb31db5c4d4d2a8a1a367f5f6.exe
Resource
win10v2004-20220812-en
General
-
Target
cb862461b4a86dd4c75533056a16139fb4448dceb31db5c4d4d2a8a1a367f5f6
-
Size
40KB
-
MD5
2ee4a346320ba9f6d1d9c169f0979026
-
SHA1
8a1b32c1e52224dae9882c2bbd6965d8fc00c82f
-
SHA256
cb862461b4a86dd4c75533056a16139fb4448dceb31db5c4d4d2a8a1a367f5f6
-
SHA512
dfcd97879a64aa99d997acd89236335fa20ccca18817bfb99909470c1acfd0aba025bf8bee6d6cb9933d4f54c23e3d6ec636732afe8bb7536d840d7b73a05fff
-
SSDEEP
768:r7+kabfs3o2LfEV0mF82DmOVkFP6Gw7fx55QOssBUaDp:2Ng39LfECRSVkFP6HJ55nDp
Malware Config
Signatures
Files
-
cb862461b4a86dd4c75533056a16139fb4448dceb31db5c4d4d2a8a1a367f5f6.exe windows x86
7d0955069f117953f4e14a7f094f1811
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateFileA
DeleteFileA
ExitProcess
FindClose
GetFileSize
GetFileType
GetProcAddress
LoadLibraryA
ReadFile
SetEndOfFile
SetFilePointer
TerminateThread
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObject
WinExec
WriteFile
user32
BeginPaint
BeginPaint
CheckMenuRadioItem
CheckRadioButton
CreateMenu
CreateWindowExA
DestroyCursor
DestroyWindow
EndPaint
ExitWindowsEx
FindWindowExA
GetCapture
GetCursorPos
GetDC
GetDesktopWindow
GetSystemMetrics
GetWindow
GetWindowDC
GetWindowTextA
GetWindowTextLengthA
InvalidateRect
IsWindow
KillTimer
LoadCursorA
LoadIconA
LoadStringA
MessageBoxA
PeekMessageA
PostMessageA
PostQuitMessage
RegisterClassA
ReleaseCapture
ReleaseDC
SendMessageA
SetCursor
SetForegroundWindow
SetMenu
SetMenuItemInfoA
SetPropA
SetScrollPos
SetScrollRange
ValidateRect
WaitMessage
wvsprintfA
gdi32
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
CreateRectRgn
CreateSolidBrush
DeleteDC
DeleteObject
SetPixel
shell32
SHBrowseForFolder
ShellExecuteA
SHGetPathFromIDList
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
CODE Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ