Static task
static1
Behavioral task
behavioral1
Sample
cdb810eacff8bdd9809382642cd244794d1a6f7f69eb36582a955915b16cb49a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cdb810eacff8bdd9809382642cd244794d1a6f7f69eb36582a955915b16cb49a.exe
Resource
win10v2004-20220812-en
General
-
Target
cdb810eacff8bdd9809382642cd244794d1a6f7f69eb36582a955915b16cb49a
-
Size
316KB
-
MD5
6715a67ab1842fdaf97fc50dd0acb5ec
-
SHA1
4fe937b2207e7ba56cdbc53f2400e4241a5540f0
-
SHA256
cdb810eacff8bdd9809382642cd244794d1a6f7f69eb36582a955915b16cb49a
-
SHA512
d8cdca148a213c2149c37a509822d53a8a958d05a1d68b6c723be80b798a7af712702ae66bc98eac90f64f19634aacd35d0d6bbbe4f8fe0f2d79e03c448a8634
-
SSDEEP
6144:w6LVNYwI9+Ajqig7TOcQv5Hx1wq1H8sBo7J:w6L3AMTOc2qsBo7J
Malware Config
Signatures
Files
-
cdb810eacff8bdd9809382642cd244794d1a6f7f69eb36582a955915b16cb49a.exe windows x86
e6aee9acd78a93a60f82a649540fbdf9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetErrorMode
ExitProcess
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapFree
HeapReAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
HeapSize
SetStdHandle
GetFileType
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
GetStdHandle
VirtualFree
HeapDestroy
GetFileTime
GetACP
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GetFileAttributesA
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetOEMCP
GetCPInfo
InterlockedIncrement
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
InterlockedDecrement
GetModuleFileNameW
FormatMessageA
LocalFree
LocalAlloc
DeleteCriticalSection
InitializeCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentProcessId
WaitForSingleObject
WritePrivateProfileStringA
GetCurrentThread
ConvertDefaultLocale
GetModuleFileNameA
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
MulDiv
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
SetLastError
lstrcmpW
GetModuleHandleA
GetVersionExA
GetVersion
CompareStringA
MultiByteToWideChar
CompareStringW
lstrlenA
WideCharToMultiByte
InterlockedExchange
FreeResource
FreeLibrary
GetProcAddress
LoadLibraryA
GetCurrentDirectoryA
GlobalLock
GlobalAlloc
LoadResource
LockResource
SizeofResource
FindResourceA
GlobalFree
GlobalUnlock
LeaveCriticalSection
EnterCriticalSection
CloseHandle
ReleaseMutex
GetLastError
HeapCreate
CreateMutexA
user32
UnregisterClassA
LoadCursorA
GetSysColorBrush
DestroyMenu
GetWindowThreadProcessId
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
PostQuitMessage
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
EndPaint
BeginPaint
ClientToScreen
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
GetMenu
PostMessageA
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
ScreenToClient
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
ReleaseDC
CallWindowProcA
GetWindowLongA
SetWindowLongA
SystemParametersInfoA
GetWindowPlacement
GetWindow
CharUpperA
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
IsWindow
EqualRect
UpdateWindow
GetDC
DrawIcon
GetSystemMetrics
IsIconic
GetClientRect
SetWindowPos
LoadIconA
GetParent
GetWindowRect
EnableWindow
SendMessageA
InvalidateRect
GetPropA
gdi32
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
CreateBitmap
GetDeviceCaps
CreatePen
ScaleViewportExtEx
MoveToEx
LineTo
SetMapMode
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
CreateSolidBrush
SetBkMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
BitBlt
CreateCompatibleBitmap
CreateDIBSection
CreateCompatibleDC
SelectObject
SetDIBColorTable
DeleteDC
GetDIBColorTable
StretchBlt
CreateFontA
DeleteObject
GetStockObject
GetObjectA
CreateFontIndirectA
msimg32
TransparentBlt
AlphaBlend
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegDeleteKeyA
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
shlwapi
PathFindFileNameA
UrlUnescapeA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
ole32
CreateStreamOnHGlobal
oleaut32
VariantClear
VariantChangeType
VariantInit
gdiplus
GdipDisposeImageAttributes
GdipSetImageAttributesColorMatrix
GdipDrawImageRectRect
GdipCreateBitmapFromStream
GdipGetImagePixelFormat
GdipGetImageHeight
GdipCreateImageAttributes
GdipGetImagePalette
GdipBitmapLockBits
GdipBitmapUnlockBits
GdipCreateBitmapFromScan0
GdipGetImageGraphicsContext
GdipDeleteGraphics
GdipDrawImageI
GdiplusShutdown
GdiplusStartup
GdipFree
GdipCreateFromHDC
GdipCloneImage
GdipAlloc
GdipGetImagePaletteSize
GdipDisposeImage
GdipGetImageWidth
wininet
InternetOpenUrlA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
InternetQueryDataAvailable
InternetSetOptionExA
InternetQueryOptionA
InternetCanonicalizeUrlA
InternetCrackUrlA
Sections
.text Size: 176KB - Virtual size: 175KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ