Static task
static1
Behavioral task
behavioral1
Sample
cfab400861eaa8deb398ae94a733186844234befb4dbf55a38d54b181e865ad7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cfab400861eaa8deb398ae94a733186844234befb4dbf55a38d54b181e865ad7.exe
Resource
win10v2004-20220812-en
General
-
Target
cfab400861eaa8deb398ae94a733186844234befb4dbf55a38d54b181e865ad7
-
Size
344KB
-
MD5
a2133188c13ed71cd485b1973373d7f0
-
SHA1
b99417024917f5ee5793480ca4a8f0da8e5b055c
-
SHA256
cfab400861eaa8deb398ae94a733186844234befb4dbf55a38d54b181e865ad7
-
SHA512
198fc38a839a16691a16ee33320069729749b1387163fd7798c5aaa052e8cdd1dca4798fdb4f1879fccc091703ab32de28534329a1c8afa1e7a9902373c4c5e3
-
SSDEEP
6144:r8NLc8poN24Y6axCKP0GGlJ9sQJ/hyA6sJJIGst08NkkMQgLhT+ZDdWsVI8uaFU0:KuSdETsQJ/hesJJIGa08NKQk6WZla/Mb
Malware Config
Signatures
Files
-
cfab400861eaa8deb398ae94a733186844234befb4dbf55a38d54b181e865ad7.exe windows x86
22cd3448e487e64bc049fa8be6e53b6c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAlloc
WritePrivateProfileStringA
DeleteFileW
FindAtomW
ScrollConsoleScreenBufferW
GetProcessWorkingSetSize
EnumResourceNamesA
GetVolumeInformationA
GlobalUnlock
GetProcessHeap
CopyFileExW
OpenEventA
GetExitCodeProcess
LockResource
GetPrivateProfileIntA
GlobalDeleteAtom
LocalSize
CancelIo
GetCommModemStatus
GetStartupInfoW
GetLogicalDrives
ReadConsoleOutputW
IsDBCSLeadByte
WriteTapemark
lstrlenW
CreateEventA
GetFileAttributesExW
InitializeCriticalSectionAndSpinCount
SetEnvironmentVariableW
IsValidCodePage
GetLocalTime
ConvertDefaultLocale
VirtualProtect
GetNumberFormatW
GlobalHandle
GenerateConsoleCtrlEvent
LocalLock
MulDiv
MultiByteToWideChar
GetTapePosition
LocalFileTimeToFileTime
HeapValidate
WaitForSingleObject
GetVersionExW
AddAtomW
GetSystemInfo
ExitProcess
DeviceIoControl
FormatMessageA
Sleep
Beep
GetCommTimeouts
GetTapeStatus
GetProfileIntA
PostQueuedCompletionStatus
WritePrivateProfileSectionA
GetCommState
TransactNamedPipe
GlobalLock
GetProcAddress
GetPrivateProfileIntW
CreateFileMappingW
CreateProcessW
GetThreadContext
GetCommProperties
FindFirstChangeNotificationA
SetConsoleTextAttribute
CompareFileTime
GetLogicalDriveStringsA
CreateDirectoryW
GetCommandLineA
WideCharToMultiByte
GetVersionExA
user32
ClientToScreen
IsCharAlphaNumericA
GetUserObjectInformationA
TranslateMDISysAccel
LoadAcceleratorsW
GetCursor
CreateDialogIndirectParamW
ShowScrollBar
CharPrevW
DefWindowProcW
ShowWindowAsync
UnhookWinEvent
OpenInputDesktop
SetKeyboardState
CreateCaret
GetClassInfoExA
TrackPopupMenuEx
MessageBoxW
SetMenuItemInfoA
IntersectRect
GetMessageW
ChangeClipboardChain
LoadAcceleratorsA
gdi32
CreateEnhMetaFileW
comdlg32
GetOpenFileNameA
advapi32
CreateProcessAsUserW
LookupPrivilegeValueW
GetPrivateObjectSecurity
RegisterEventSourceA
DeleteAce
RegSetValueExW
GetSecurityDescriptorLength
GetSecurityDescriptorDacl
ChangeServiceConfigW
CreateServiceA
CryptGetProvParam
RegQueryValueExA
CloseServiceHandle
StartServiceCtrlDispatcherW
IsValidAcl
CryptSetProvParam
DuplicateToken
SetSecurityDescriptorDacl
GetNamedSecurityInfoA
CryptCreateHash
AccessCheckAndAuditAlarmA
GetCurrentHwProfileW
ImpersonateLoggedOnUser
AllocateAndInitializeSid
OpenServiceW
CloseEventLog
CryptImportKey
GetAclInformation
AllocateLocallyUniqueId
SetSecurityInfo
AddAccessAllowedAce
CryptSetKeyParam
CreateServiceW
RegUnLoadKeyA
shell32
SHGetFileInfoA
ole32
OleCreateLinkFromData
OleFlushClipboard
OleInitialize
PropVariantCopy
CoQueryClientBlanket
OleRegGetMiscStatus
CreateILockBytesOnHGlobal
StgCreateDocfile
CreateGenericComposite
OleCreateLinkToFile
comctl32
ImageList_GetIconSize
CreatePropertySheetPageA
shlwapi
PathGetCharTypeA
setupapi
SetupDiClassGuidsFromNameExA
SetupIterateCabinetW
SetupDiOpenDeviceInterfaceW
SetupCloseInfFile
SetupDiSetSelectedDriverA
Sections
.text Size: 296KB - Virtual size: 295KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE