Static task
static1
Behavioral task
behavioral1
Sample
cbb9da244a8eab0c33a4114f1b9d9ad6102d27068e48acec614a27d5224ee2e2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cbb9da244a8eab0c33a4114f1b9d9ad6102d27068e48acec614a27d5224ee2e2.exe
Resource
win10v2004-20220901-en
General
-
Target
cbb9da244a8eab0c33a4114f1b9d9ad6102d27068e48acec614a27d5224ee2e2
-
Size
2.4MB
-
MD5
b0f2e2cb6ec37fdc132ec74ae2a283bd
-
SHA1
33dbcb74cd1bd22ac0e00715b6560ec0f02669b8
-
SHA256
cbb9da244a8eab0c33a4114f1b9d9ad6102d27068e48acec614a27d5224ee2e2
-
SHA512
69e1f7d50581a21c32fa0eed4a6b1dfd1b602b7e3b04486b88729feb2cf13dcb9b2b957b0fe7885f23b2cc16794154eb9656316d8842c82ef2a8bc466adeb2cd
-
SSDEEP
6144:Mtbrf8XZBB5TQA5WShZCuLjePGf9yJSoVnuttEsXgdzsD:Onf8XHTQA5WSquve+f9ykanu/idQD
Malware Config
Signatures
Files
-
cbb9da244a8eab0c33a4114f1b9d9ad6102d27068e48acec614a27d5224ee2e2.exe windows x86
2a1facc222207c1843e4600029695191
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentDirectoryW
GetCurrentProcessId
ExitProcess
GetProcAddress
GetCurrentThreadId
WriteFile
LoadLibraryA
GetCommandLineA
HeapAlloc
GetLastError
SetLastError
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
GetModuleHandleExW
MultiByteToWideChar
GetStdHandle
GetModuleFileNameW
GetProcessHeap
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
IsDebuggerPresent
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
HeapFree
Sleep
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
LoadLibraryExW
OutputDebugStringW
LoadLibraryW
RtlUnwind
HeapReAlloc
GetStringTypeW
HeapSize
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
SetFilePointerEx
WriteConsoleW
CloseHandle
CreateFileW
advapi32
OpenProcessToken
Sections
.text Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 161KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data2 Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ