Static task
static1
Behavioral task
behavioral1
Sample
cf67272eb8aae105166171a51cf317d2c20d51dd042746a1be818ce9a4214e18.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cf67272eb8aae105166171a51cf317d2c20d51dd042746a1be818ce9a4214e18.exe
Resource
win10v2004-20220901-en
General
-
Target
cf67272eb8aae105166171a51cf317d2c20d51dd042746a1be818ce9a4214e18
-
Size
880KB
-
MD5
396a4412720e369fdfbac09cc53d51e1
-
SHA1
ffe6edae9debe222568c079622723987a8d7f9a4
-
SHA256
cf67272eb8aae105166171a51cf317d2c20d51dd042746a1be818ce9a4214e18
-
SHA512
f0112562480311552be00d0272c81f063899f6f95e593f15b1d3382b3e575578df28503974609c7efb0620928e2efb64071f5d4c4c48049424cc62d7e58e58ad
-
SSDEEP
12288:bNnuK+72TgSp6I81s+iqS0qbrAKTrmF5sR595W3XlLeWkb2gW:5I72lpj81Y/b/TyF5aenwWkbp
Malware Config
Signatures
Files
-
cf67272eb8aae105166171a51cf317d2c20d51dd042746a1be818ce9a4214e18.exe windows x86
bafe5119b4d8129eb0b3ed45961004ac
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
LocalSize
GetDriveTypeA
CloseHandle
GetModuleHandleA
HeapCreate
CreateFileMappingW
GetStartupInfoA
GetCommandLineA
lstrlenA
TlsAlloc
DeviceIoControl
DeleteFileA
IsDebuggerPresent
GetConsoleAliasA
CloseHandle
HeapDestroy
CreateFileW
Sleep
GetModuleFileNameW
user32
PeekMessageA
FindWindowW
DestroyMenu
DestroyWindow
GetWindowLongA
CallWindowProcW
DispatchMessageA
GetIconInfo
LoadImageA
IsZoomed
IsWindow
DispatchMessageA
DrawTextW
devenum
DllRegisterServer
DllRegisterServer
DllRegisterServer
DllRegisterServer
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 872KB - Virtual size: 872KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ