Static task
static1
Behavioral task
behavioral1
Sample
cf863b6615238824fea622c80f71d6ea9b8cd5d0bdc362f6b3e513e39bd681f3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cf863b6615238824fea622c80f71d6ea9b8cd5d0bdc362f6b3e513e39bd681f3.exe
Resource
win10v2004-20220901-en
General
-
Target
cf863b6615238824fea622c80f71d6ea9b8cd5d0bdc362f6b3e513e39bd681f3
-
Size
433KB
-
MD5
7610498cf8b37816f5f5a6054cf8d9b0
-
SHA1
956ce6cf6df82e85416bf94c3b37de47f1f3d73e
-
SHA256
cf863b6615238824fea622c80f71d6ea9b8cd5d0bdc362f6b3e513e39bd681f3
-
SHA512
3c6007117bf4db1570079c0a27dad9830f5bd979b54385ed633c8c6f5eb1a6959e0739a9611b96a6be6aaa1ab6a0f3656be4ad073db58d0019007f6c4e60d4a8
-
SSDEEP
12288:aTcZJSi6FBCRfSuR+ybSMLPytF7R5eVc0K:agZJSRCfJtbSML2R5Ac
Malware Config
Signatures
Files
-
cf863b6615238824fea622c80f71d6ea9b8cd5d0bdc362f6b3e513e39bd681f3.exe windows x86
878acaa191d82d47c7965ee9ff52bfe8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetTickCount
HeapSize
GetStdHandle
RemoveDirectoryW
GetCurrentDirectoryA
GetTickCount
FindClose
GetEnvironmentVariableA
GetFileAttributesW
WaitForSingleObject
CloseHandle
Sleep
GetStartupInfoW
CreateMutexW
OpenThread
ExitProcess
GetModuleHandleA
GetFileSize
WaitForMultipleObjects
GetLocalTime
HeapCreate
DeleteFileA
ReleaseMutex
SetLastError
user32
GetDC
GetCursorPos
DispatchMessageW
PeekMessageA
GetDC
GetDC
GetClassInfoA
GetDC
MessageBoxA
GetWindowLongA
DispatchMessageW
CallWindowProcW
GetSysColor
wshcon
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 624KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 428KB - Virtual size: 427KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ