Static task
static1
Behavioral task
behavioral1
Sample
0cfacaa33b818c2b2a01f43d8dcde1916771a20a3a178b02e1d58478c307abf7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0cfacaa33b818c2b2a01f43d8dcde1916771a20a3a178b02e1d58478c307abf7.exe
Resource
win10v2004-20220812-en
General
-
Target
0cfacaa33b818c2b2a01f43d8dcde1916771a20a3a178b02e1d58478c307abf7
-
Size
204KB
-
MD5
020b854db89630d227558a65ba4f17e4
-
SHA1
d70637d04ffa38da1b00556e70bf8f5a1d818bb6
-
SHA256
0cfacaa33b818c2b2a01f43d8dcde1916771a20a3a178b02e1d58478c307abf7
-
SHA512
d11ce4220443af67ad26d0a615b57d694e2d54aaea411a6cc7af92e7795235e4065c2a0fbdc66d162fe3be90baef9612d92b0e62dfecc8d963fe8d4ee3082b67
-
SSDEEP
3072:m6DhXCgmt0yMzEgNKIY7/iqzASuZWpY/NKiiup/2F4pE/vlq:m8hSgmtFMAkqUSZm/NXiguF4pE/v
Malware Config
Signatures
Files
-
0cfacaa33b818c2b2a01f43d8dcde1916771a20a3a178b02e1d58478c307abf7.exe windows x86
b5a618ee3adeb704533a32ccb1547d4a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
lstrlenW
GetCommandLineW
GetOEMCP
ExitThread
LoadLibraryA
SetEvent
LoadLibraryExA
SetEndOfFile
GetProcAddress
GetModuleHandleA
GetModuleHandleW
SetErrorMode
GetACP
ResetEvent
ExitProcess
IsBadReadPtr
SetFilePointer
SetHandleCount
VirtualAlloc
Sections
.text Size: 172KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1004B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fdata Size: 4KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 808B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ