Static task
static1
Behavioral task
behavioral1
Sample
cbb69a74a9f8ec04cb71f5857eb55b6ed399dbf92ed6ed2de0738c3b5f9a2b43.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cbb69a74a9f8ec04cb71f5857eb55b6ed399dbf92ed6ed2de0738c3b5f9a2b43.exe
Resource
win10v2004-20220812-en
General
-
Target
cbb69a74a9f8ec04cb71f5857eb55b6ed399dbf92ed6ed2de0738c3b5f9a2b43
-
Size
424KB
-
MD5
bc5293fc4535b15ad670c8a58d9d2560
-
SHA1
4ec663d224d029b3fba0ae701522439c26395c87
-
SHA256
cbb69a74a9f8ec04cb71f5857eb55b6ed399dbf92ed6ed2de0738c3b5f9a2b43
-
SHA512
a0ff20a077fc6f8fcff1c3321acf8ff954896764bd71923065a93a197c715d9fd044958434a026d3461fcf273f3fc69523ddb985b70033c780a1eae4e492c707
-
SSDEEP
12288:amM+X6gSTFp6q5ePiWkO1AeV5WhtblCJxfS6:5Mq6gSTLj5f5O5u5OR1
Malware Config
Signatures
Files
-
cbb69a74a9f8ec04cb71f5857eb55b6ed399dbf92ed6ed2de0738c3b5f9a2b43.exe windows x86
0401005902aa334b9f077b911ad707fe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
comdlg32
ChooseColorA
ntdsapi
DsFreeSpnArrayW
msvcrt
memcpy
memset
kernel32
GlobalMemoryStatusEx
FindNextVolumeMountPointW
shell32
SHFileOperationA
clusapi
ClusterNodeEnum
Sections
.text Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
ordo Size: 4KB - Virtual size: 795B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.t Size: 4KB - Virtual size: 46B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 930B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 367KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mrt1 Size: 100KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CODE Size: 100KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ