Static task
static1
Behavioral task
behavioral1
Sample
00cd58dc4419292a8292827672b4a4542eb23fe7948b34784034911575d4d720.exe
Resource
win7-20220812-en
General
-
Target
00cd58dc4419292a8292827672b4a4542eb23fe7948b34784034911575d4d720.exe
-
Size
2.1MB
-
MD5
bba1f1cf805ad51affea3f10baab9786
-
SHA1
67be9f10d915661582bd79fbd4f194274e438e56
-
SHA256
00cd58dc4419292a8292827672b4a4542eb23fe7948b34784034911575d4d720
-
SHA512
a3f7cc4c1ffb7c6e9440a64160b31e51d22bc1f36e1abea4604e11f45a409df17f8d2d3674e0bdb82953b9780a03930df0ec6a420c145465b5464de0bdd247ad
-
SSDEEP
49152:mAtVvgZbTChxKCnFnQXBbrtgb/iQvu0UHOa5m:PbgZ6hxvWbrtUTrUHOh
Malware Config
Signatures
Files
-
00cd58dc4419292a8292827672b4a4542eb23fe7948b34784034911575d4d720.exe.exe windows x86
730073214094cd328547bf1f72289752
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResumeThread
WriteProcessMemory
VirtualProtectEx
GetModuleFileNameW
DuplicateHandle
GetCurrentProcess
SetFileTime
CopyFileW
GetDriveTypeW
GetFileTime
CreateFileW
SetErrorMode
GetTempFileNameW
GetTempPathW
ExitProcess
Sleep
DeleteFileW
CloseHandle
WaitForSingleObject
CreateProcessW
ReadProcessMemory
GetThreadSelectorEntry
GetThreadContext
GetLastError
lstrlenW
GetModuleHandleW
GetStartupInfoW
user32
MessageBoxA
shell32
ShellExecuteW
msvcrt
memset
wcscpy
free
_fileno
_chsize
wcsrchr
wcscat
malloc
fclose
fread
fwrite
fseek
_wfopen
sprintf
fflush
_exit
_XcptFilter
exit
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 540KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE