Static task
static1
Behavioral task
behavioral1
Sample
cdafc32bf671ee97467d4a3cf1731ff276259e3c421675200442b3dd9ff0ce64.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cdafc32bf671ee97467d4a3cf1731ff276259e3c421675200442b3dd9ff0ce64.exe
Resource
win10v2004-20220901-en
General
-
Target
cdafc32bf671ee97467d4a3cf1731ff276259e3c421675200442b3dd9ff0ce64
-
Size
143KB
-
MD5
44cdf14dc0155442a3f2499058ec42c0
-
SHA1
b2c069b4f79bd58baea21eeb656218115bc02f7f
-
SHA256
cdafc32bf671ee97467d4a3cf1731ff276259e3c421675200442b3dd9ff0ce64
-
SHA512
512056bb8fd68e5e7c5c13d9f96521464228ca1a4daa725c760feb3eac205e6c82c375d852399437283265ace863ca34d02ba9aa2bffe56c94eb29b76ce8c9dd
-
SSDEEP
3072:pmRUTH5biGE0rQuwcxt2PDH1BdOB6UkSDGCH:pmRuZbmKQbPD1BdGK
Malware Config
Signatures
Files
-
cdafc32bf671ee97467d4a3cf1731ff276259e3c421675200442b3dd9ff0ce64.exe windows x86
9c01c7af446cdb4047b0e1a014ea95b0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SizeofResource
FindClose
RaiseException
LoadResource
CreateProcessW
GetEnvironmentVariableW
LockResource
GetModuleFileNameW
GetSystemTime
GetLogicalDriveStringsW
lstrlenW
lstrcpyW
DeleteFileW
FindFirstFileW
CreateDirectoryW
Sleep
GetFileAttributesW
FindResourceExW
GetVersionExW
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
lstrcatW
WideCharToMultiByte
GetLastError
RemoveDirectoryW
FindResourceW
LoadLibraryA
CreateFileA
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetStdHandle
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetVersionExA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
CloseHandle
GetCPInfo
GetOEMCP
IsValidCodePage
MultiByteToWideChar
LCMapStringA
LCMapStringW
ReadFile
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
SetFilePointer
GetConsoleCP
user32
DdeConnect
DdeClientTransaction
DdeUninitialize
DdeFreeDataHandle
UnregisterClassA
DdeCreateStringHandleW
DdeInitializeW
DdeFreeStringHandle
DdeDisconnect
advapi32
RegOpenKeyW
RegQueryValueExW
RegCloseKey
RegOpenKeyExW
shell32
SHGetSpecialFolderPathW
ShellExecuteW
ole32
CoInitialize
CoCreateInstance
oleaut32
VariantClear
VariantInit
SysAllocString
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
Sections
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�a��u� Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE