Static task
static1
Behavioral task
behavioral1
Sample
cfc404f06e6378a67b12c679aeb8db01460e107b090d3a24a1586c7b7f483657.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cfc404f06e6378a67b12c679aeb8db01460e107b090d3a24a1586c7b7f483657.exe
Resource
win10v2004-20220812-en
General
-
Target
cfc404f06e6378a67b12c679aeb8db01460e107b090d3a24a1586c7b7f483657
-
Size
252KB
-
MD5
53b259033df2bded597a5eaa4baefd91
-
SHA1
4a507a6dfa0771930c2760be8d23fa2600292629
-
SHA256
cfc404f06e6378a67b12c679aeb8db01460e107b090d3a24a1586c7b7f483657
-
SHA512
b144262abd7cda77ddd525dc0952b6a6b7478a7dd97436e59fbd04c111bb1881353b114888c7063b6f398fbfbd6fc205e8e1aca5b96f16f891c739cebacff789
-
SSDEEP
6144:6BHoY0TE9MKdOP8tui97oGX2la3L2AKHKwjBoJE:6CY0TE9l552Y3L8HKk2J
Malware Config
Signatures
Files
-
cfc404f06e6378a67b12c679aeb8db01460e107b090d3a24a1586c7b7f483657.exe windows x86
6f9b2320b001abb42fc2041a24b8aa18
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DrawFrameControl
CheckRadioButton
SendDlgItemMessageA
GetClipboardData
SendMessageA
DestroyWindow
SetClipboardData
AppendMenuA
GetActiveWindow
FillRect
TrackPopupMenu
SetForegroundWindow
PostMessageA
IsDialogMessageA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
OleInitialize
OleSetContainedObject
xolehlp
ord5
ord7
kernel32
DeleteCriticalSection
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
GetSystemInfo
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetCPInfo
GetOEMCP
WriteConsoleW
VirtualProtect
LoadLibraryExA
GetNativeSystemInfo
ExpandEnvironmentStringsA
GetDriveTypeA
GetVolumeInformationA
Sleep
CreateProcessA
CloseHandle
GetStartupInfoA
DeleteFileA
GetTickCount
FlushFileBuffers
CreateThread
LocalFree
LocalAlloc
InitializeCriticalSection
EnterCriticalSection
CreateDirectoryA
ResetEvent
VirtualFree
VirtualAlloc
ExitProcess
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
HeapFree
HeapAlloc
GetCommandLineA
GetVersionExA
LeaveCriticalSection
FatalAppExitA
HeapDestroy
HeapCreate
HeapReAlloc
IsBadWritePtr
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
SetLastError
GetCurrentThreadId
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
RtlUnwind
HeapSize
InterlockedExchange
VirtualQuery
LoadLibraryA
GetACP
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 104KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 360KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ