Static task
static1
Behavioral task
behavioral1
Sample
cb4bb5b2742d2fadd30754bbe27421b2cdb5b843ad05d7c1fe14f68ef6a732b0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb4bb5b2742d2fadd30754bbe27421b2cdb5b843ad05d7c1fe14f68ef6a732b0.exe
Resource
win10v2004-20220812-en
General
-
Target
cb4bb5b2742d2fadd30754bbe27421b2cdb5b843ad05d7c1fe14f68ef6a732b0
-
Size
262KB
-
MD5
620ce4306488c72cceb5a09c885aef7d
-
SHA1
c6eb1bcd57978b722c0c2dad1fc62c63969eb1a8
-
SHA256
cb4bb5b2742d2fadd30754bbe27421b2cdb5b843ad05d7c1fe14f68ef6a732b0
-
SHA512
79b4760a7f26f19064594086d90317b0e7a0c7633601dadcc4cb9f6df4c15eac47c6b5c17d33e11f74f5f89061e69c6eb17e6b1c343a2037bd04cb64c7a5b600
-
SSDEEP
6144:NKuticnb1f0q6EsUaspmTU4xw7Sqmdkjy5C/X8FuUH1:NKciQxBasYjwQqjygfOu
Malware Config
Signatures
Files
-
cb4bb5b2742d2fadd30754bbe27421b2cdb5b843ad05d7c1fe14f68ef6a732b0.exe windows x86
246b30195c63344ea90be49be25ca5fc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
comdlg32
GetSaveFileNameA
oleaut32
SafeArrayPtrOfIndex
RegisterTypeLib
SafeArrayCreate
SysStringLen
VariantChangeType
SafeArrayGetElement
OleLoadPicture
SafeArrayUnaccessData
SysReAllocStringLen
SysAllocStringLen
gdi32
SetPixel
LineTo
SetTextColor
GetObjectA
CreatePalette
BitBlt
advapi32
RegEnumKeyA
RegQueryValueA
RegOpenKeyA
RegDeleteKeyA
user32
RegisterClassA
SetWindowLongA
InsertMenuItemA
GetWindowPlacement
IsDialogMessageA
MoveWindow
DestroyCursor
UpdateWindow
GetLastActivePopup
RegisterWindowMessageA
SetWindowPos
GetCursor
InvalidateRect
GetMenu
IsChild
SendMessageA
EnableWindow
FrameRect
CloseClipboard
IntersectRect
DestroyIcon
GetCapture
ole32
StgOpenStorage
OleRegGetUserType
CreateStreamOnHGlobal
CoTaskMemFree
CoDisconnectObject
CoRevokeClassObject
kernel32
LocalReAlloc
FindClose
GetProcessHeap
WriteFile
GetACP
GetCurrentThreadId
ExitThread
VirtualAlloc
GetCommandLineA
GetProcAddress
LoadLibraryExA
lstrlenA
ExitProcess
GetUserDefaultLCID
MulDiv
EnumCalendarInfoA
LocalAlloc
GetModuleHandleA
shell32
SHGetSpecialFolderLocation
DragQueryFileA
Sections
.text Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 221KB - Virtual size: 220KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
BSS Size: 512B - Virtual size: 447B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ