Static task
static1
Behavioral task
behavioral1
Sample
cb5daf8dedf6bc79b6f486aea54c80314ff6abe8d68dee884e38e8e2a9a21624.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb5daf8dedf6bc79b6f486aea54c80314ff6abe8d68dee884e38e8e2a9a21624.exe
Resource
win10v2004-20220812-en
General
-
Target
cb5daf8dedf6bc79b6f486aea54c80314ff6abe8d68dee884e38e8e2a9a21624
-
Size
143KB
-
MD5
7235581a65beefec3ccb2ecf60ced390
-
SHA1
72674e7ce4271b598fca20029d43b2520c13db1b
-
SHA256
cb5daf8dedf6bc79b6f486aea54c80314ff6abe8d68dee884e38e8e2a9a21624
-
SHA512
4a04a1f4495c1095899c9dbda52785ff30d1fc3635744ffb3d0b1c914e4bfd9265f5978ef82d84224ea6be61ce4b306336f7f802f4a848c96c8e8d905fb89d4a
-
SSDEEP
3072:JI4UfP3+bFwLiAwgdXm2eU/UpPOtPyAUjJZbt4:m4Z8/UH/C
Malware Config
Signatures
Files
-
cb5daf8dedf6bc79b6f486aea54c80314ff6abe8d68dee884e38e8e2a9a21624.exe windows x86
37a0321d18e1b7d14bdde8d541872359
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CompareStringW
LeaveCriticalSection
WriteFile
ExitProcess
GetVersionExW
CloseHandle
WideCharToMultiByte
GetOEMCP
LCMapStringW
HeapReAlloc
SetFilePointer
DeleteCriticalSection
GetACP
GetModuleFileNameW
CreateThread
GetModuleFileNameA
CreateEventW
GetTickCount
CreateFileA
FreeLibraryAndExitThread
lstrlenW
VirtualAlloc
GetCurrentProcessId
GetModuleHandleW
GetCurrentThread
CreateEventA
InterlockedIncrement
GetCurrentThreadId
GetVersionExA
CompareFileTime
QueryPerformanceCounter
InterlockedDecrement
GetStartupInfoW
GetCurrentDirectoryA
GetCurrentProcess
GetStartupInfoA
CreateMutexA
GetModuleHandleA
GetStdHandle
CompareStringA
GetTimeZoneInformation
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetStringTypeW
GetStringTypeA
LCMapStringA
GetLocaleInfoW
GetLocaleInfoA
MultiByteToWideChar
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapDestroy
HeapCreate
VirtualFree
GetSystemTimeAsFileTime
FatalAppExitA
EnterCriticalSection
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
LoadLibraryA
InitializeCriticalSection
GetCPInfo
Sleep
RtlUnwind
HeapSize
SetEnvironmentVariableA
user32
GetSystemMetrics
gdi32
CreateRectRgnIndirect
CreateDIBitmap
SetTextColor
GetDeviceCaps
CreateFontIndirectW
GetStretchBltMode
CreateFontIndirectA
GetStockObject
ExtSelectClipRgn
SetBkColor
SetMapMode
DeleteDC
RectVisible
CreateDIBSection
SetBkMode
GetObjectW
PatBlt
GetClipBox
CreateSolidBrush
LineTo
CreatePalette
CreateCompatibleBitmap
BitBlt
SelectPalette
SelectClipRgn
CreateBitmap
GetTextExtentPoint32W
DeleteObject
CreateCompatibleDC
SetStretchBltMode
SetWindowOrgEx
MoveToEx
ExtTextOutW
Rectangle
RealizePalette
GetObjectA
RestoreDC
ExtTextOutA
CreatePenIndirect
ExtCreatePen
ole32
StgCreateDocfileOnILockBytes
CreateBindCtx
CLSIDFromProgID
CLSIDFromString
OleRun
OleInitialize
CoQueryProxyBlanket
CoTaskMemFree
msi
ord46
shell32
SHFileOperationW
Sections
.text Size: 78KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 38KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ