Static task
static1
Behavioral task
behavioral1
Sample
cb02972a00cfa72c58df8ca12e378f2af186819317e21fd6d78b929e5c8264ee.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cb02972a00cfa72c58df8ca12e378f2af186819317e21fd6d78b929e5c8264ee.exe
Resource
win10v2004-20220812-en
General
-
Target
cb02972a00cfa72c58df8ca12e378f2af186819317e21fd6d78b929e5c8264ee
-
Size
128KB
-
MD5
37ffba8a71d312cc353846990e070010
-
SHA1
e3db000f34b920789a0f679a300bbe9bdd04aca7
-
SHA256
cb02972a00cfa72c58df8ca12e378f2af186819317e21fd6d78b929e5c8264ee
-
SHA512
7b6025be9088d1164865a4c4870a17799a30ff7224e7b56745e9ec8d4c091421628748f0c723c986124dcc410588320b94f7c4780aacd1b62705e920526c9f34
-
SSDEEP
3072:KKBD9PdHUFUDqkgwtMn6z7swcxcvMUJ+2grn:KcUKo6srcFk2i
Malware Config
Signatures
Files
-
cb02972a00cfa72c58df8ca12e378f2af186819317e21fd6d78b929e5c8264ee.exe windows x86
34993ee53fbcacaaa8b37eb18ee07841
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
atl71
ord30
ord31
ord58
ord61
ord23
ord32
ord49
ord20
ord17
ord64
ord22
ord18
imagehlp
SymCleanup
SymSetOptions
SymInitialize
SymGetModuleBase
SymFunctionTableAccess
StackWalk
SymGetSymFromAddr
SymUnDName
SymGetModuleInfo
sqlunirl
_GetUnicodeRedirectionLayer@0
_GetProcAddress_@8
_LoadString@16
_FormatMessage@28
_GetVersionEx@4
kernel32
GetThreadLocale
Sleep
SetErrorMode
QueryPerformanceFrequency
GlobalMemoryStatus
GetVersionExA
GetSystemInfo
WriteFile
lstrlenA
HeapFree
CloseHandle
FlushFileBuffers
GetLocaleInfoA
HeapAlloc
GetProcessHeap
GetCurrentProcess
GetEnvironmentVariableA
SetFilePointer
CreateFileA
GetModuleFileNameA
GetSystemDefaultLCID
GetModuleHandleA
FreeLibrary
lstrcpyA
ExpandEnvironmentStringsA
LoadLibraryA
GetACP
GetLastError
GetSystemDefaultLangID
MultiByteToWideChar
WideCharToMultiByte
ResetEvent
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetEvent
InterlockedIncrement
GetStdHandle
InterlockedDecrement
WaitForSingleObject
WaitForMultipleObjects
SetConsoleScreenBufferSize
GetConsoleScreenBufferInfo
SetConsoleCtrlHandler
AllocConsole
GetCurrentThreadId
CreateEventA
GetCommandLineA
RaiseException
InterlockedExchange
FormatMessageA
ExitProcess
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
ReadProcessMemory
user32
MessageBoxA
wsprintfA
advapi32
DeregisterEventSource
MakeSelfRelativeSD
GetSecurityDescriptorLength
GetTokenInformation
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
IsValidSid
GetLengthSid
CopySid
RegSetValueExA
RegisterEventSourceA
ReportEventA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
OpenProcessToken
ole32
CoRevokeClassObject
CoRegisterClassObject
CoCreateInstance
CoUninitialize
CoInitializeSecurity
CoInitializeEx
oleaut32
SysStringLen
LoadTypeLi
LoadRegTypeLi
SysFreeString
msvcp71
?_Nomemory@std@@YAXXZ
msvcr71
_cexit
_XcptFilter
_exit
_c_exit
_callnewh
memset
_controlfp
exit
__dllonexit
__security_error_handler
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_resetstkoflw
_iob
freopen
printf
fclose
_onexit
wcschr
wprintf
_except_handler3
free
??3@YAXPAX@Z
??_V@YAXPAX@Z
sprintf
strchr
asctime
localtime
time
_strnicmp
_stricmp
wcsncat
wcslen
wcscpy
wcsncpy
_purecall
malloc
__p___initenv
Sections
.text Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 712B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE