Static task
static1
Behavioral task
behavioral1
Sample
c0bf7b87e1d56ab791dc621001af50efa295fb577c5055f65cbbbc44775219ff.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c0bf7b87e1d56ab791dc621001af50efa295fb577c5055f65cbbbc44775219ff.exe
Resource
win10v2004-20220812-en
General
-
Target
c0bf7b87e1d56ab791dc621001af50efa295fb577c5055f65cbbbc44775219ff
-
Size
77KB
-
MD5
3cde8a59043c4352cdde712db0fcefe1
-
SHA1
1d456443421d3ee8654b57b3a2639af7a0ac7de2
-
SHA256
c0bf7b87e1d56ab791dc621001af50efa295fb577c5055f65cbbbc44775219ff
-
SHA512
05646d16890fd6d870fe9af3d6cecc375715d7c639cbcd7b46ee6885ebc885526983ee20c356985baef2e484018fcf53c0217bd00de61fb24e4398fcdf024425
-
SSDEEP
1536:Aa5oWb5sPmp+CoDrjbgGu4oXIPqhCEEK7H7eSI3fFMhzcp0M:AUoW9/QCoz7u4FqEgHPa2hzM
Malware Config
Signatures
Files
-
c0bf7b87e1d56ab791dc621001af50efa295fb577c5055f65cbbbc44775219ff.exe windows x86
fd0d3cd8d995392d784be2585ecdec4b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FileTimeToSystemTime
SetEnvironmentVariableA
GetExitCodeProcess
SizeofResource
FileTimeToDosDateTime
CompareStringA
lstrcmpiA
RtlMoveMemory
lstrcatA
TerminateProcess
IsBadCodePtr
LoadResource
DeleteFileA
RaiseException
IsValidCodePage
GetCurrentThread
GetUserDefaultLCID
GetOEMCP
GetProcAddress
SetHandleCount
GetTempPathA
ExitProcess
VirtualProtect
GetDriveTypeA
SetStdHandle
GetThreadLocale
GetVersionExW
GetModuleFileNameA
GetModuleHandleA
GetFileAttributesA
GetPrivateProfileStringA
msvcrt
_adjust_fdiv
__p___initenv
_controlfp
__getmainargs
__p__commode
_XcptFilter
__p__fmode
_initterm
_except_handler3
__set_app_type
_exit
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ