Static task
static1
Behavioral task
behavioral1
Sample
a0cf23d87284f8a1b3cd8dc1040347bc2375ee1a2429faebfe7dee813abf2f35.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a0cf23d87284f8a1b3cd8dc1040347bc2375ee1a2429faebfe7dee813abf2f35.exe
Resource
win10v2004-20220812-en
General
-
Target
a0cf23d87284f8a1b3cd8dc1040347bc2375ee1a2429faebfe7dee813abf2f35
-
Size
88KB
-
MD5
03ee8fa60638ba7e8211d1fb8c4eecd8
-
SHA1
a17725efbb0f95cf6f5752610151e6429a55158d
-
SHA256
a0cf23d87284f8a1b3cd8dc1040347bc2375ee1a2429faebfe7dee813abf2f35
-
SHA512
072133efa02b8660c7bd3f4b15c075b62f7576014242a98c07c594f14da12d69d0ac9eb83492fd20cdf44fbc7a100f99f6ae140b258f4eb24d1b9fb187ecb007
-
SSDEEP
1536:1Hfd6uVcH0TgkTAwKeqXIR/Sl9/F70LVU10C:j6uq8HsbXIRaD/V0L6aC
Malware Config
Signatures
Files
-
a0cf23d87284f8a1b3cd8dc1040347bc2375ee1a2429faebfe7dee813abf2f35.exe windows x86
e17f87dafc0aedaef4ad64703a3577ee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileType
CreateSemaphoreW
HeapFree
FindClose
RemoveDirectoryA
WaitForMultipleObjects
FindAtomA
ExitThread
CreateDirectoryA
GetDriveTypeW
AddAtomA
GetProcessHeap
IsBadWritePtr
ClearCommBreak
HeapCreate
WriteFile
DeleteAtom
RemoveDirectoryA
CloseHandle
GetModuleHandleA
GetCommandLineA
CreatePipe
GetModuleFileNameA
SetEndOfFile
SetVolumeLabelA
clbcatq
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
msvidc32
DriverProc
DriverProc
DriverProc
DriverProc
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 81KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE