Static task
static1
Behavioral task
behavioral1
Sample
cff5fcf232a184b0c33f341662f3cbb8402e5543b33731fae5884f2ce935c641.exe
Resource
win7-20220901-en
General
-
Target
cff5fcf232a184b0c33f341662f3cbb8402e5543b33731fae5884f2ce935c641
-
Size
137KB
-
MD5
0fc5867f8feaeeea7e8cd80a84b86ed1
-
SHA1
9dc4f6497d4bb54a8480a460cb2bc91a4837ba0c
-
SHA256
cff5fcf232a184b0c33f341662f3cbb8402e5543b33731fae5884f2ce935c641
-
SHA512
ded4d64b6941718099719f3487996352016dbe7cded12c77560066ddd1abee78a37d789abfd9a74e46f22680f8653fa549f234651e944690849f953eea7d2103
-
SSDEEP
3072:qp+FD6K71QkbstyJjCKICpC72s/mlaXpBUT+rR4Aky:qp+z713bstyJj0sC7/HpBUqfky
Malware Config
Signatures
Files
-
cff5fcf232a184b0c33f341662f3cbb8402e5543b33731fae5884f2ce935c641.exe windows x86
ddbb90ebf41500dde8a2155d2d44be6d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
VariantChangeTypeEx
SysStringLen
SysAllocStringLen
VariantCopyInd
VariantClear
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
advapi32
RegQueryValueExA
RegCloseKey
OpenProcessToken
RegOpenKeyExA
LookupPrivilegeValueA
kernel32
SetCommConfig
CreateFileA
CloseHandle
FindResourceA
Sleep
DeleteFileA
VirtualFree
SetFilePointer
SetErrorMode
GetSystemInfo
RemoveDirectoryA
ReadFile
GetUserDefaultLangID
OutputDebugStringA
GetEnvironmentVariableA
GetWindowsDirectoryA
GetLocaleInfoA
LoadLibraryA
GetACP
LockResource
GetFileSize
FormatMessageA
FlushViewOfFile
GetExitCodeProcess
GetFullPathNameA
GetLastError
GetSystemDefaultLCID
SetEndOfFile
GetFileAttributesA
LoadResource
VirtualQuery
GetCurrentProcess
SizeofResource
GetProcAddress
GetVersionExA
GetModuleHandleA
GetCommandLineA
GetModuleFileNameA
IsDBCSLeadByte
CreateProcessA
VirtualProtect
CreateDirectoryA
VirtualAlloc
InterlockedExchange
WriteFile
ReadFile
GetCommandLineA
GetModuleHandleA
GetLastError
GetStdHandle
CreateFileA
GetFileSize
ExitProcess
WideCharToMultiByte
LocalAlloc
TlsSetValue
VirtualAlloc
LocalFree
WriteFile
LeaveCriticalSection
GetFileType
SetEndOfFile
TlsGetValue
SetFilePointer
CloseHandle
VirtualFree
MultiByteToWideChar
GetSystemTime
RaiseException
EnterCriticalSection
DeleteCriticalSection
user32
MessageBoxA
SetWindowLongA
CharPrevA
ExitWindowsEx
TranslateMessage
MsgWaitForMultipleObjects
LoadStringA
CallWindowProcA
DestroyWindow
CreateWindowExA
PeekMessageA
DispatchMessageA
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.packed Size: 114KB - Virtual size: 115KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ueiiihs Size: 4KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rbijuly Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE