Static task
static1
Behavioral task
behavioral1
Sample
cdb512944e295c1c4d6de28e5f17b303edd9dc45eed498a417438b7aeeb70a00.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cdb512944e295c1c4d6de28e5f17b303edd9dc45eed498a417438b7aeeb70a00.exe
Resource
win10v2004-20221111-en
General
-
Target
cdb512944e295c1c4d6de28e5f17b303edd9dc45eed498a417438b7aeeb70a00
-
Size
296KB
-
MD5
b7b92fe69443f3ce537447e4640ed0a8
-
SHA1
784d71fbfe93f7bacc723953f8a5dcd757040e44
-
SHA256
cdb512944e295c1c4d6de28e5f17b303edd9dc45eed498a417438b7aeeb70a00
-
SHA512
feab103977bac04f00e1067e7daf2cd1f11de79626573c665baaf8adce69da54109d6d4c4343812f20c7d848ebb3b414f2a1da7c6d3bbf34647dbba6e8ead041
-
SSDEEP
6144:mxJsFXVEiYuiqqORfhMW4YU85bJ4yxFleuZJrzzwPNa8z:mxJshDY58Q/Y5bpFBziz
Malware Config
Signatures
Files
-
cdb512944e295c1c4d6de28e5f17b303edd9dc45eed498a417438b7aeeb70a00.exe windows x86
b758866f79a545fe6c1910b2b39b3470
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsProcessorFeaturePresent
CompareStringA
FillConsoleOutputCharacterA
GetModuleHandleA
PulseEvent
SetNamedPipeHandleState
EnumTimeFormatsW
SetMailslotInfo
IsBadStringPtrA
CreateWaitableTimerA
GetProfileIntA
GlobalAddAtomA
SystemTimeToFileTime
CreateIoCompletionPort
GetProfileStringA
CreateFileW
GetVersion
SetConsoleActiveScreenBuffer
DeleteCriticalSection
SetThreadLocale
SetErrorMode
GetVolumeInformationW
ReadConsoleOutputA
SetVolumeLabelA
ReadDirectoryChangesW
SetConsoleTitleA
FreeEnvironmentStringsA
CreateDirectoryW
Beep
VirtualFree
RaiseException
LoadLibraryExA
WriteConsoleOutputW
FormatMessageA
SetCommTimeouts
QueryDosDeviceA
GetTapeStatus
lstrcpynA
SetCommMask
CreatePipe
GetHandleInformation
SetProcessWorkingSetSize
GetProcessHeap
AllocConsole
GetLocaleInfoW
RemoveDirectoryW
GetThreadPriority
WritePrivateProfileStructA
WritePrivateProfileStringW
GetFileAttributesExA
GetLargestConsoleWindowSize
CompareStringW
GlobalReAlloc
GetOEMCP
IsValidLocale
DuplicateHandle
OpenSemaphoreW
LocalAlloc
GetStringTypeExW
GetDriveTypeW
GlobalAddAtomW
EnumSystemCodePagesW
SetEndOfFile
AreFileApisANSI
GetUserDefaultLCID
_lread
SetFileAttributesA
SetTimeZoneInformation
GetTickCount
PeekNamedPipe
FormatMessageW
FlushConsoleInputBuffer
VirtualAlloc
GetCurrentProcess
DebugBreak
GlobalFlags
GetStartupInfoA
GetPrivateProfileStringA
GlobalUnlock
GetPrivateProfileSectionW
WritePrivateProfileSectionA
LoadLibraryExW
PeekConsoleInputW
GetSystemTimeAsFileTime
VirtualLock
LocalFileTimeToFileTime
EnumDateFormatsW
CreateMutexW
GetPrivateProfileStringW
_hread
ExitProcess
EnumCalendarInfoA
GetDiskFreeSpaceW
VirtualUnlock
GetTimeZoneInformation
OutputDebugStringW
user32
CreateAcceleratorTableW
LoadAcceleratorsA
SetPropW
InsertMenuA
GetKeyNameTextA
SetMenuDefaultItem
ModifyMenuW
DrawTextA
EndMenu
BeginPaint
CreateDesktopA
BeginDeferWindowPos
SetPropA
GetKeyboardState
RegisterDeviceNotificationA
CreateWindowStationW
IsWindowUnicode
TrackMouseEvent
DefFrameProcW
SendMessageTimeoutA
GetDCEx
GetMessageW
EnumDisplaySettingsExW
CloseWindowStation
GetWindowRgn
LoadIconW
GetTopWindow
ExitWindowsEx
GetKeyboardLayoutNameA
EnumDesktopWindows
CharUpperBuffW
ActivateKeyboardLayout
CreateDialogParamA
GetInputState
GetUserObjectInformationW
SetActiveWindow
IsCharAlphaNumericA
GetMenu
GetGuiResources
IsCharUpperW
EnumClipboardFormats
LoadAcceleratorsW
EmptyClipboard
GetTabbedTextExtentA
CreateWindowExW
EnumDisplaySettingsW
VkKeyScanW
GetWindowInfo
MapVirtualKeyExW
CreateDialogIndirectParamA
SetWindowLongW
IsCharAlphaA
SetDlgItemTextA
ExcludeUpdateRgn
MsgWaitForMultipleObjectsEx
IsWindowVisible
SetKeyboardState
DeleteMenu
UnregisterClassA
GrayStringA
CopyIcon
SetCapture
gdi32
MoveToEx
GetDeviceCaps
DeleteDC
GetCharWidthW
GetNearestColor
WidenPath
GetFontLanguageInfo
CreateEnhMetaFileW
IntersectClipRect
StretchBlt
comdlg32
ReplaceTextA
PageSetupDlgA
ChooseFontA
advapi32
InitializeAcl
RegConnectRegistryW
RegSetKeySecurity
RegRestoreKeyW
AddAccessDeniedAce
RegDeleteValueW
SetTokenInformation
ReadEventLogW
QueryServiceConfigW
GetUserNameW
RegEnumValueA
AddAce
RegQueryValueExW
CreatePrivateObjectSecurity
SetEntriesInAclA
CryptGenKey
RegOpenKeyExW
CryptEncrypt
OpenProcessToken
ImpersonateSelf
MakeSelfRelativeSD
MapGenericMask
RegLoadKeyW
GetUserNameA
CryptReleaseContext
RegisterEventSourceW
GetServiceDisplayNameW
QueryServiceConfigA
CryptDestroyHash
RevertToSelf
RegOpenKeyW
GetLengthSid
OpenSCManagerW
RegDeleteKeyA
SetKernelObjectSecurity
shell32
Shell_NotifyIconA
ole32
OleSetClipboard
oleaut32
LoadTypeLibEx
SafeArrayRedim
LoadTypeLi
comctl32
ImageList_GetImageInfo
ImageList_DrawEx
shlwapi
SHRegGetBoolUSValueW
SHRegGetUSValueW
SHCreateStreamOnFileW
AssocQueryKeyW
StrFormatByteSize64A
PathStripPathW
StrTrimW
PathIsSameRootW
StrFormatKBSizeW
PathRemoveArgsW
PathFindFileNameA
StrChrW
UrlApplySchemeW
PathGetDriveNumberA
PathCommonPrefixW
PathIsRelativeA
msvcrt
__p__fmode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
__set_app_type
_except_handler3
__p__commode
_controlfp
Sections
.text Size: 236KB - Virtual size: 233KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE