Static task
static1
Behavioral task
behavioral1
Sample
cd03e5918bc290f24253d3ab539cd576ca0958e646a06cffaca3d889233e5150.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cd03e5918bc290f24253d3ab539cd576ca0958e646a06cffaca3d889233e5150.exe
Resource
win10v2004-20220812-en
General
-
Target
cd03e5918bc290f24253d3ab539cd576ca0958e646a06cffaca3d889233e5150
-
Size
93KB
-
MD5
0288ce02aa356944e29e4628ba96a429
-
SHA1
602590187e6d1de6b7736efa027287f07a63d731
-
SHA256
cd03e5918bc290f24253d3ab539cd576ca0958e646a06cffaca3d889233e5150
-
SHA512
1990629de6c75811e32c6391eed154de83bed6f21d900310077394ab616613f315786a09eb36929961b76eaea12074f7fcce44749de919d078a3fd07b384041d
-
SSDEEP
1536:MzCgU7LTocBmc0f/mFrnnNNPBu54AEgJv6HnjrVmOqDVsCyABtRejwEOsM8:MWg+mPf/mFrnnNFkLAHnjBmbVhe0PsM8
Malware Config
Signatures
Files
-
cd03e5918bc290f24253d3ab539cd576ca0958e646a06cffaca3d889233e5150.exe windows x86
f75641f81dd7e20273ab183c24077d84
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
InterlockedExchange
Sleep
InterlockedCompareExchange
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
SetLastError
VirtualAllocEx
LoadLibraryA
PrivMoveFileIdentityW
FindFirstVolumeA
FindActCtxSectionStringA
OpenFile
GlobalAddAtomA
CreateProcessA
HeapLock
GetStringTypeExA
SetConsoleHardwareState
_hread
FindResourceExA
GetTempFileNameW
GetCurrencyFormatW
GetConsoleNlsMode
OpenThread
GetOEMCP
AllocateUserPhysicalPages
_hwrite
AddLocalAlternateComputerNameA
GlobalUnlock
GetUserDefaultLangID
LocalLock
CommConfigDialogW
GlobalMemoryStatusEx
AddAtomA
FindFirstVolumeMountPointA
CreateDirectoryExW
SetLocalPrimaryComputerNameW
BeginUpdateResourceA
GetPrivateProfileSectionA
EnumResourceTypesW
Thread32Next
BuildCommDCBW
LeaveCriticalSection
GetProcessWorkingSetSize
BaseCheckAppcompatCache
lstrcmpA
OpenJobObjectA
CloseConsoleHandle
GetCurrentDirectoryA
HeapValidate
WriteConsoleOutputCharacterW
GetLogicalDriveStringsW
CreateConsoleScreenBuffer
GetSystemDirectoryW
SetComputerNameExA
CancelWaitableTimer
SetVolumeLabelA
SetFirmwareEnvironmentVariableW
SetConsoleCursor
SetFileShortNameA
SetCriticalSectionSpinCount
_lopen
OpenConsoleW
GetProfileStringA
GetLocaleInfoA
ReadConsoleInputW
DosPathToSessionPathA
EnumLanguageGroupLocalesA
GetConsoleScreenBufferInfo
RaiseException
ClearCommError
TerminateThread
IsProcessInJob
MoveFileWithProgressA
RequestDeviceWakeup
WriteFileEx
SetCurrentDirectoryA
GlobalAddAtomW
GetDiskFreeSpaceW
LockFileEx
GetCompressedFileSizeW
OpenProcess
WriteConsoleInputVDMA
WriteConsoleOutputAttribute
MapViewOfFile
GetDateFormatW
SearchPathW
LZOpenFileW
GetEnvironmentStringsA
GetProcessShutdownParameters
ReleaseMutex
GetTimeZoneInformation
GlobalFindAtomW
CreatePipe
GetPrivateProfileSectionNamesA
GetTapeParameters
GetProcessIoCounters
WritePrivateProfileSectionA
SetWaitableTimer
GlobalLock
EnumCalendarInfoA
ProcessIdToSessionId
WriteConsoleOutputCharacterA
DebugActiveProcess
QueryPerformanceFrequency
GetComPlusPackageInstallStatus
GetConsoleHardwareState
EndUpdateResourceA
GetConsoleAliasesW
ExpandEnvironmentStringsW
DelayLoadFailureHook
SizeofResource
GetModuleFileNameW
CompareStringA
PrivCopyFileExW
GetFileType
LocalSize
SetFileTime
ConvertDefaultLocale
ReadConsoleOutputW
GetUserDefaultUILanguage
WriteFile
EnumDateFormatsExW
LCMapStringW
GetFirmwareEnvironmentVariableA
EnumCalendarInfoExW
SetFileApisToANSI
GetDiskFreeSpaceExA
ReadConsoleInputExW
SetConsoleMaximumWindowSize
GetMailslotInfo
IsValidLocale
GetAtomNameA
QueryDosDeviceW
Heap32Next
DebugBreakProcess
EnumUILanguagesA
GetVolumeInformationA
GetTapePosition
FindNextVolumeMountPointA
QueryActCtxW
ExpungeConsoleCommandHistoryA
ScrollConsoleScreenBufferA
EnumSystemGeoID
TlsAlloc
LZCloseFile
SetConsolePalette
user32
UnhookWindowsHook
IsCharAlphaNumericW
CloseClipboard
GetDlgCtrlID
CharToOemA
GetMenuItemInfoA
EnumDisplayDevicesA
DdeCreateStringHandleA
DefWindowProcW
IsCharAlphaNumericA
EqualRect
CountClipboardFormats
ToAscii
ArrangeIconicWindows
DialogBoxIndirectParamA
CreateAcceleratorTableW
UserClientDllInitialize
GetClassNameW
GetWindowTextA
GetScrollInfo
RegisterClassA
UpdateWindow
SubtractRect
DrawTextW
DrawCaptionTempA
BeginPaint
UnregisterClassA
GetUserObjectInformationW
DispatchMessageA
PrivateExtractIconsA
SendNotifyMessageA
SetTimer
DdeGetQualityOfService
UnlockWindowStation
BroadcastSystemMessageExW
AttachThreadInput
SetClipboardViewer
ActivateKeyboardLayout
SendInput
OemToCharW
DragDetect
IsCharAlphaW
ShowScrollBar
UserRegisterWowHandlers
ShowCaret
SetPropA
GetSystemMetrics
AnimateWindow
CharNextExA
ShowCursor
SetWindowsHookA
CreateSystemThreads
WindowFromPoint
TileWindows
GetMessageTime
DrawMenuBar
CharUpperA
DrawCaptionTempW
GetMonitorInfoA
GetTopWindow
comdlg32
GetFileTitleA
ChooseFontW
winmm
midiInStop
mmioFlush
timeGetTime
midiOutMessage
midiOutLongMsg
mmioWrite
waveOutGetID
PlaySoundW
midiOutGetVolume
mciDriverNotify
midiInPrepareHeader
waveOutWrite
mmDrvInstall
waveOutGetErrorTextW
midiOutCacheDrumPatches
waveOutPrepareHeader
DrvGetModuleHandle
waveOutSetVolume
mid32Message
waveInGetErrorTextW
midiStreamOpen
mmioStringToFOURCCA
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.pdata Size: 1024B - Virtual size: 525KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 57KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ