Static task
static1
Behavioral task
behavioral1
Sample
cb24b90f3e758daa3cd275a7a808d1de046d14c9abdc20a09c666141a3b0d04e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cb24b90f3e758daa3cd275a7a808d1de046d14c9abdc20a09c666141a3b0d04e.exe
Resource
win10v2004-20220812-en
General
-
Target
cb24b90f3e758daa3cd275a7a808d1de046d14c9abdc20a09c666141a3b0d04e
-
Size
86KB
-
MD5
f98e2c7c077d8be345af8342b5e630b5
-
SHA1
d0528f7fe3310058ab0b11ba3d5d9d44fcc74f66
-
SHA256
cb24b90f3e758daa3cd275a7a808d1de046d14c9abdc20a09c666141a3b0d04e
-
SHA512
c14a4768c17a62b7f9191993ba96d7783c280bc6ef6a5f6636d5cf8c78cc8b4cddfb5c267ad38f6371ec3faf3bb805bd5e4d5bce191d650e7fbae1e2577df7e7
-
SSDEEP
1536:MQViqYP58ntLMqJISyQ6iN2tYvnl5fRnJTqWH:jYunV5y3426jfRnJT
Malware Config
Signatures
Files
-
cb24b90f3e758daa3cd275a7a808d1de046d14c9abdc20a09c666141a3b0d04e.exe windows x86
cad40305637a90741259559e1e47ca4d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CloseHandle
CopyFileA
CreateDirectoryA
CreateEventA
CreateFileA
CreateMutexA
CreateProcessA
CreateThread
DeleteCriticalSection
EnterCriticalSection
EnumResourceLanguagesA
EnumResourceNamesA
EnumResourceTypesA
ExitProcess
ExitThread
ExpandEnvironmentStringsW
FileTimeToDosDateTime
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindResourceA
FindResourceExA
FreeResource
GetCommandLineA
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFileType
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetThreadPriority
GetTickCount
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadResource
LocalAlloc
LocalFree
LockResource
MultiByteToWideChar
ReadFile
ReadProcessMemory
ResetEvent
ResumeThread
SetEvent
SetFilePointer
SetLastError
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
SuspendThread
TerminateThread
TlsAlloc
TlsGetValue
TlsSetValue
TryEnterCriticalSection
WaitForSingleObject
WideCharToMultiByte
WinExec
WriteFile
oleaut32
SysAllocStringLen
SysFreeString
SysReAllocStringLen
user32
CharLowerBuffW
CharUpperBuffW
DispatchMessageA
GetMessageA
MessageBoxA
SetWindowsHookExA
TranslateMessage
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 8KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_MEM_DISCARDABLE
.idata Size: 2KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
bcismqt Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE