Static task
static1
Behavioral task
behavioral1
Sample
cdfb66a39ce84bd747afc13ce907a0f3b7549a337ddb51072eea88b68900cfe3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cdfb66a39ce84bd747afc13ce907a0f3b7549a337ddb51072eea88b68900cfe3.exe
Resource
win10v2004-20220812-en
General
-
Target
cdfb66a39ce84bd747afc13ce907a0f3b7549a337ddb51072eea88b68900cfe3
-
Size
320KB
-
MD5
a09b5f5f524883ccda83eba6d37f0f10
-
SHA1
68296f05f176dae6b92489804d614953d5faacc0
-
SHA256
cdfb66a39ce84bd747afc13ce907a0f3b7549a337ddb51072eea88b68900cfe3
-
SHA512
17274d2ac886a70637625bb30fcda52f765918745d4be652eb0673857d5b6fa01e681ddae16bd748eeb18931668c2d8af21287d32dd4a13077531f6a2af1f90e
-
SSDEEP
6144:IEIMYYk8qutH2RfS155ONNXBuWoJBO9OMbHLkAqF7Ief9UmM7/uT:TIMo8N2EB0NxDIBuOFe7/uT
Malware Config
Signatures
Files
-
cdfb66a39ce84bd747afc13ce907a0f3b7549a337ddb51072eea88b68900cfe3.exe windows x86
9db9682b5e716a8046f18ba419cf596f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalLock
RtlMoveMemory
FindAtomW
SetThreadIdealProcessor
ResumeThread
GetProcessVersion
FindVolumeClose
SetLocalTime
GetPriorityClass
BaseProcessInitPostImport
DisableThreadLibraryCalls
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.brdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tc Size: 244KB - Virtual size: 244KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE