Static task
static1
Behavioral task
behavioral1
Sample
cb1b73ab2c5285ffe501baf7062f2abab4105565f553d431103ba504c075cff2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb1b73ab2c5285ffe501baf7062f2abab4105565f553d431103ba504c075cff2.exe
Resource
win10v2004-20220812-en
General
-
Target
cb1b73ab2c5285ffe501baf7062f2abab4105565f553d431103ba504c075cff2
-
Size
80KB
-
MD5
84bc6fa6f9a3769f4452cd4db5a8a430
-
SHA1
6a18df74d4f74191aca4a2209560a86f386741f9
-
SHA256
cb1b73ab2c5285ffe501baf7062f2abab4105565f553d431103ba504c075cff2
-
SHA512
a16bd38013e9d1bb3bcf5702c81fe77a891bcd256238054e380788d03e29f5b3b159a25190c74d191123f3eccbbcdd56574743240ae790c23e9e7642339e3c38
-
SSDEEP
768:ungg9cb7jjJmqxeQl8pHV8gFa+ruS9vnDiiPA2klcIEelY06TwLZc2g44BK1:rgyb7vLYA8p18n2vWiPA2e26Y06MRgW
Malware Config
Signatures
Files
-
cb1b73ab2c5285ffe501baf7062f2abab4105565f553d431103ba504c075cff2.exe windows x86
e56d96ed901c74890a1804e3add944df
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
SuspendThread
ResumeThread
GetDriveTypeA
GetProcessHeap
ReadConsoleW
GetLocaleInfoA
DeleteFileA
GetFileAttributesA
VirtualProtect
CreateDirectoryA
GlobalSize
GetPriorityClass
WriteFile
HeapSize
SetLocalTime
GetModuleHandleA
CreatePipe
GetCommandLineA
ResumeThread
IsBadReadPtr
GetStdHandle
user32
LoadCursorA
DestroyMenu
GetWindowTextW
DispatchMessageA
DestroyIcon
DrawIcon
GetMessageA
SetCursor
SetRect
GetWindowLongA
PeekMessageA
GetWindowLongA
wsprintfA
els
DllGetClassObject
DllGetClassObject
DllRegisterServer
DllRegisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE