Static task
static1
Behavioral task
behavioral1
Sample
cf5a0720029008eaf55a8e4726aa5eb9b482b29df0e35655399b06ed43832fa0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cf5a0720029008eaf55a8e4726aa5eb9b482b29df0e35655399b06ed43832fa0.exe
Resource
win10v2004-20220901-en
General
-
Target
cf5a0720029008eaf55a8e4726aa5eb9b482b29df0e35655399b06ed43832fa0
-
Size
361KB
-
MD5
68d56365b5167f11374421e8ceb68190
-
SHA1
f7b10c688137f960559060b40dce6c7cda5497bd
-
SHA256
cf5a0720029008eaf55a8e4726aa5eb9b482b29df0e35655399b06ed43832fa0
-
SHA512
3ff45449d09167930d26247b4ceef42ab049784da583cd1efaa9ed1160fb0a1654ab0b1728f62789fe59d0945b49ffe030e63146e1e4c30eec0abc29327a46e6
-
SSDEEP
6144:OC2mN9DwFYI1IUe8QGls4n8krZmbKkjMvnAufVYCNvjz98QDTPHap12bKQh+a+Qr:OC2mN9DwaI11e8plakrZ+KkjMvn3N76i
Malware Config
Signatures
Files
-
cf5a0720029008eaf55a8e4726aa5eb9b482b29df0e35655399b06ed43832fa0.exe windows x86
ce757e7cd1d26d7b4d7cd3d7a8d14f51
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
LoadLibraryA
RtlUnwind
InterlockedExchange
VirtualQuery
HeapReAlloc
HeapAlloc
HeapFree
VirtualAlloc
GlobalDeleteAtom
TlsFree
LoadLibraryExA
GetProfileIntW
GetNamedPipeHandleStateW
DeleteCriticalSection
ReadFile
WriteFileGather
EnumDateFormatsExA
SetThreadLocale
OutputDebugStringW
Thread32Next
RemoveDirectoryA
GetLogicalDriveStringsW
GlobalReAlloc
ReadConsoleA
GetTimeFormatA
GetWindowsDirectoryW
GetPrivateProfileSectionNamesW
FreeEnvironmentStringsA
WriteConsoleOutputW
FormatMessageW
GlobalLock
CreateDirectoryExW
GetThreadPriority
lstrcat
InterlockedDecrement
CreateConsoleScreenBuffer
InitializeCriticalSectionAndSpinCount
GetProcessTimes
GetNamedPipeInfo
GetDriveTypeA
WaitForSingleObject
WriteConsoleOutputA
SetSystemTime
SetFileAttributesW
Toolhelp32ReadProcessMemory
GetShortPathNameW
ReadConsoleOutputCharacterA
GlobalUnfix
GetNumberFormatW
LoadModule
DisableThreadLibraryCalls
GetProcessHeap
FlushConsoleInputBuffer
ReadDirectoryChangesW
GetProfileIntA
GetNumberFormatA
GetTempFileNameW
FindFirstFileExW
GetVersion
OpenEventW
GetSystemTimeAdjustment
GetCurrencyFormatA
ExpandEnvironmentStringsA
WaitNamedPipeA
ReadConsoleOutputA
lstrcmpi
CreateRemoteThread
FoldStringW
CreateWaitableTimerA
GetDiskFreeSpaceA
user32
GetProcessDefaultLayout
InsertMenuItemA
GetListBoxInfo
SetPropW
GetWindowTextW
CreateDialogIndirectParamA
DdeConnectList
UnregisterClassA
IntersectRect
EndDialog
CreateWindowStationA
ModifyMenuA
DdeDisconnectList
GetWindowLongW
DrawMenuBar
GetKeyNameTextW
FindWindowExW
EnableScrollBar
EndDeferWindowPos
CreateDesktopW
GetClientRect
DialogBoxParamA
SetWindowTextW
FrameRect
ReuseDDElParam
ChangeMenuA
RegisterWindowMessageW
GetFocus
GetClassNameW
Sections
.text Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 249KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ