Static task
static1
Behavioral task
behavioral1
Sample
cb50a982d3c7814aab0fff66ff62b6eef326800d167729d9e96611ce7150a500.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cb50a982d3c7814aab0fff66ff62b6eef326800d167729d9e96611ce7150a500.exe
Resource
win10v2004-20220812-en
General
-
Target
cb50a982d3c7814aab0fff66ff62b6eef326800d167729d9e96611ce7150a500
-
Size
117KB
-
MD5
a7d3995ee7c69c1b48c8ad32cb309186
-
SHA1
74b3afce391299134e0df13d1ee91685c0c72118
-
SHA256
cb50a982d3c7814aab0fff66ff62b6eef326800d167729d9e96611ce7150a500
-
SHA512
3dfcdf3ae03fe49c4228732e7eb3668d04e05aa8e93e4f68a81d7f174b1d443c02fb37a34ea3a7e2409afe385aa49b7cf6440a3b7cfdd9afd4ade8209ad4b81f
-
SSDEEP
1536:yKxz0xVVGWFM+CNdflyCBBORz0jfuKyJCIGSH35NOQIh6VQtno:vxz0hGXNVZBQRz0HVSH3mhZtn
Malware Config
Signatures
Files
-
cb50a982d3c7814aab0fff66ff62b6eef326800d167729d9e96611ce7150a500.exe windows x86
4134667653b692ec00e013d117605acf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DrawIconEx
GetMenuState
SetWindowTextA
FillRect
CreateMenu
GetPropA
EndDeferWindowPos
EnumChildWindows
GetIconInfo
GetCursor
GetDlgItem
DrawMenuBar
IsWindowEnabled
BeginPaint
GetSysColorBrush
SetCursor
EnableMenuItem
CharNextA
GetScrollInfo
MessageBoxA
GetMenuItemID
GetMenuItemCount
FindWindowA
EnableWindow
GetDC
IsChild
CheckMenuItem
GetFocus
BeginDeferWindowPos
ClientToScreen
GetParent
DrawEdge
DrawTextA
IsDialogMessageA
EnumThreadWindows
CallWindowProcA
GetCursorPos
CreateIcon
HideCaret
IsMenu
SetWindowLongA
GetWindow
SetWindowPos
RegisterClassA
DefWindowProcA
ShowWindow
CallNextHookEx
FrameRect
CharToOemA
GetMessagePos
GetSubMenu
GetClientRect
GetDCEx
GetClipboardData
GetClassLongA
GetClassInfoA
DeferWindowPos
DefMDIChildProcA
GetKeyState
SystemParametersInfoA
DefFrameProcA
EnableScrollBar
GetMenuItemInfoA
SetTimer
GetWindowTextA
msvcrt
log10
memmove
kernel32
GetCPInfo
ReadFile
MoveFileA
GetProcessHeap
LocalFree
VirtualQuery
GetLocaleInfoA
GetLocalTime
LockResource
DeleteCriticalSection
MoveFileExA
LoadLibraryA
GetSystemDefaultLangID
GetVersion
EnterCriticalSection
FreeResource
GetVersionExA
lstrcpynA
FindResourceA
WaitForSingleObject
VirtualAllocEx
VirtualAlloc
GetCurrentProcessId
FindFirstFileA
Sleep
HeapAlloc
ExitProcess
lstrcmpA
LocalReAlloc
FormatMessageA
GetFullPathNameA
GetModuleFileNameA
SetHandleCount
GetLastError
GetStringTypeW
CreateThread
lstrcatA
CloseHandle
GetDateFormatA
GetStdHandle
GetDiskFreeSpaceA
GetFileType
GetProcAddress
lstrlenA
HeapDestroy
CompareStringA
GlobalFindAtomA
InitializeCriticalSection
GetCurrentThreadId
RaiseException
GetModuleHandleA
FreeLibrary
GlobalAlloc
LocalAlloc
SetEndOfFile
GetThreadLocale
FindClose
SetErrorMode
DeleteFileA
CreateEventA
SetFilePointer
GetEnvironmentStrings
CreateFileA
LoadLibraryExA
shlwapi
SHDeleteKeyA
SHDeleteValueA
SHGetValueA
SHQueryInfoKeyA
Sections
.text Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.init Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 51KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE