Static task
static1
Behavioral task
behavioral1
Sample
c0f59cb38dcb229223470ba223b2388dd8eb42eb31837aa8c729e69aa49181d6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c0f59cb38dcb229223470ba223b2388dd8eb42eb31837aa8c729e69aa49181d6.exe
Resource
win10v2004-20220812-en
General
-
Target
c0f59cb38dcb229223470ba223b2388dd8eb42eb31837aa8c729e69aa49181d6
-
Size
243KB
-
MD5
471bc27549710b1c06dbf6fdb4b470f1
-
SHA1
38662c709640d1bf6a76775b0cc00cba17efb7c4
-
SHA256
c0f59cb38dcb229223470ba223b2388dd8eb42eb31837aa8c729e69aa49181d6
-
SHA512
ae427c5d8cd9c3918e42fed16f71f1ca4b15babdd5a10cb1d1419a575f48262bccbc93c75b47ffc50b796586d5206b150abbf0d4d97d4c593a4e86be6130bdc0
-
SSDEEP
6144:LMUdRXB8mtBeUY6VCbF7VM0CJvA3yxmp1yWHin66tzt:Lhdf8mtRCb3M0CpHG1Lb6t5
Malware Config
Signatures
Files
-
c0f59cb38dcb229223470ba223b2388dd8eb42eb31837aa8c729e69aa49181d6.exe windows x86
5d81a5533d99e25af8177b6d2646ad74
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
_isnan
sprintf
strncpy
strcmp
memmove
memcpy
_CIpow
strlen
kernel32
GetModuleHandleA
HeapCreate
Sleep
HeapDestroy
ExitProcess
GetCurrentThreadId
GetCurrentProcessId
CloseHandle
InitializeCriticalSection
GetModuleFileNameA
HeapReAlloc
HeapAlloc
HeapFree
user32
CallWindowProcA
MessageBoxA
GetWindowThreadProcessId
IsWindowVisible
IsWindowEnabled
GetForegroundWindow
GetWindowLongA
SetWindowPos
EnableWindow
EnumWindows
comctl32
InitCommonControlsEx
ole32
CoInitialize
Sections
.code Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 57B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc.. Size: 219KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ