Static task
static1
Behavioral task
behavioral1
Sample
cb5732aa8982c643e8dbbdc14f655a880e95cff681b8c53300a60ed82f3569be.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb5732aa8982c643e8dbbdc14f655a880e95cff681b8c53300a60ed82f3569be.exe
Resource
win10v2004-20220812-en
General
-
Target
cb5732aa8982c643e8dbbdc14f655a880e95cff681b8c53300a60ed82f3569be
-
Size
94KB
-
MD5
f9a84c6a32993b5658fe134024723415
-
SHA1
944b61216fd623bd596e88f3265cc7c1bc3828c5
-
SHA256
cb5732aa8982c643e8dbbdc14f655a880e95cff681b8c53300a60ed82f3569be
-
SHA512
f5ea3276b21944b7965b50ea5910726fbb8416740945033b636ec2c38aa1c917a2feb9917c6f0bb9d8befb113493baecc345932518e45a2d3f05596c176884e7
-
SSDEEP
1536:ZDlk50/EDi5oOmEia6li7rHIDF4W4E0oPEoPxLmi5OS9KJL3em2gSCOkz3LVUxFi:ZqUEDr7ymoo54Wh0osmlKJLe9+z3BUa
Malware Config
Signatures
Files
-
cb5732aa8982c643e8dbbdc14f655a880e95cff681b8c53300a60ed82f3569be.exe windows x86
b3ffd07a6c5de3ea9bd05b8818659036
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegDeleteValueA
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExA
RegOpenKeyExA
RegEnumValueA
RegCreateKeyExA
RegCreateKeyExA
RegEnumKeyExA
RegEnumValueA
GetLengthSid
RegQueryInfoKeyA
RegDeleteKeyA
RegDeleteValueA
ole32
CoCreateGuid
OleRegGetUserType
CoCreateFreeThreadedMarshaler
StringFromIID
CreateOleAdviseHolder
StringFromIID
StgCreateDocfileOnILockBytes
CoReleaseMarshalData
CoTaskMemFree
StgOpenStorage
CoUninitialize
CoUnmarshalInterface
oleaut32
SafeArrayUnaccessData
SysFreeString
SafeArrayPtrOfIndex
SafeArrayGetElement
GetErrorInfo
SysReAllocStringLen
SafeArrayCreate
VariantChangeType
RegisterTypeLib
SysStringLen
SafeArrayUnaccessData
SafeArrayGetElement
SysAllocStringLen
OleLoadPicture
comdlg32
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
GetSaveFileNameA
ChooseColorA
FindTextA
GetFileTitleA
FindTextA
GetFileTitleA
ChooseColorA
GetSaveFileNameA
user32
CreatePopupMenu
GetMenu
GetMenuItemID
EnableMenuItem
DrawIcon
DrawTextA
GetFocus
CallNextHookEx
EndDeferWindowPos
CreateIcon
GetCapture
GetMenuItemCount
GetMenuStringA
IsWindowEnabled
BeginDeferWindowPos
GetScrollInfo
EnumWindows
DefMDIChildProcA
GetKeyNameTextA
SetWindowPos
DrawFrameControl
EnumChildWindows
EndPaint
ShowScrollBar
GetCursor
ClientToScreen
GetClipboardData
GetSubMenu
DrawMenuBar
CreateWindowExA
SetTimer
GetMenuStringA
ShowWindow
DispatchMessageW
GetForegroundWindow
CallNextHookEx
GetCapture
GetActiveWindow
GetCursorPos
GetClipboardData
GetClassLongA
GetDesktopWindow
DefFrameProcA
EnumChildWindows
GetDlgItem
SetWindowPos
IsWindowEnabled
CreateIcon
DrawEdge
ClientToScreen
GetWindowTextA
CharLowerBuffA
GetWindow
DrawTextA
GetScrollInfo
GetDC
EnableMenuItem
GetDCEx
BeginPaint
CreateMenu
GetMenuItemInfoA
FindWindowA
CreatePopupMenu
DefMDIChildProcA
GetMenuItemCount
IsDialogMessageA
GetSubMenu
GetScrollPos
DrawIcon
GetKeyNameTextA
IsWindowVisible
GetScrollRange
GetKeyState
EnumThreadWindows
SystemParametersInfoA
ShowScrollBar
EnableScrollBar
DrawFrameControl
BeginDeferWindowPos
GetSysColorBrush
GetClassInfoA
GetSysColor
CharToOemA
EndDeferWindowPos
GetCursor
SetCursor
DispatchMessageA
GetFocus
CheckMenuItem
SetWindowLongA
GetPropA
GetLastActivePopup
IsChild
IsMenu
GetIconInfo
EndPaint
FrameRect
CharNextA
EnumWindows
GetParent
CallWindowProcA
GetMenu
DefWindowProcA
EqualRect
HideCaret
TrackPopupMenu
GetClientRect
RegisterClassA
DrawIconEx
SetWindowTextA
GetMessagePos
DeferWindowPos
CharLowerA
GetMenuItemID
EnableWindow
FillRect
GetMenuState
MessageBoxA
TrackPopupMenu
GetScrollPos
GetWindow
GetSysColor
GetForegroundWindow
DrawEdge
GetMenuItemCount
CreatePopupMenu
DispatchMessageW
GetCapture
GetMenuStringA
EnableScrollBar
EqualRect
FillRect
SetCursor
DrawTextA
ShowScrollBar
HideCaret
IsDialogMessageA
DrawIcon
GetDesktopWindow
FindWindowA
DefMDIChildProcA
GetDCEx
GetClipboardData
EndPaint
ClientToScreen
GetWindowTextA
shlwapi
SHGetValueA
SHEnumValueA
SHDeleteKeyA
SHEnumValueA
SHStrDupA
SHStrDupA
SHQueryValueExA
PathIsDirectoryA
SHDeleteValueA
PathGetCharTypeA
PathIsContentTypeA
SHEnumValueA
PathFileExistsA
SHSetValueA
SHDeleteKeyA
comctl32
ImageList_Remove
ImageList_Create
ImageList_DragShowNolock
msvcrt
wcsncmp
clock
log
_acmdln
memcmp
memcpy
fabs
memmove
mbstowcs
pow
ceil
strcmp
memcpy
calloc
srand
sqrt
tolower
exp
sin
strlen
malloc
clock
kernel32
GetModuleHandleA
GetDiskFreeSpaceA
GetTickCount
LocalAlloc
LoadLibraryExA
CompareStringA
CloseHandle
SetLastError
GetSystemDefaultLangID
VirtualAlloc
Sleep
ExitThread
FreeResource
GetCurrentThread
LoadLibraryA
lstrcmpiA
GetACP
InitializeCriticalSection
CreateThread
SetThreadLocale
GetStringTypeW
GlobalDeleteAtom
GlobalAlloc
FindClose
GetVersionExA
SetHandleCount
ExitProcess
CreateEventA
gdi32
CreatePalette
CreateCompatibleDC
CreatePenIndirect
SetBkColor
GetObjectA
SetBkMode
BitBlt
GetPaletteEntries
GetDCOrgEx
shell32
DragQueryFileA
SHFileOperationA
SHGetDiskFreeSpaceA
SHGetDesktopFolder
SHFileOperationA
SHGetFolderPathA
SHGetFileInfoA
SHGetSpecialFolderLocation
DragQueryFileA
SHGetDesktopFolder
Shell_NotifyIconA
version
GetFileVersionInfoA
GetFileVersionInfoA
VerInstallFileA
Sections
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.init Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ