Static task
static1
Behavioral task
behavioral1
Sample
cad0a022c7c3076e9cab0424dc91c94d4885bcfebbf21b15057ccc7ab6448f29.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cad0a022c7c3076e9cab0424dc91c94d4885bcfebbf21b15057ccc7ab6448f29.exe
Resource
win10v2004-20220812-en
General
-
Target
cad0a022c7c3076e9cab0424dc91c94d4885bcfebbf21b15057ccc7ab6448f29
-
Size
88KB
-
MD5
69166b55e14fc99695fedeae0c7b1ffc
-
SHA1
3b386b028144e66683b573d05f2515a14189e25e
-
SHA256
cad0a022c7c3076e9cab0424dc91c94d4885bcfebbf21b15057ccc7ab6448f29
-
SHA512
f5ece4c66036e6459ea7abd73d88c5eedb4d0e70b288bd9ad60a346577d2859d2c944732dc29a633602f1e2a191b31fc9d4380d9c9801dc440f7022948e84f8a
-
SSDEEP
1536:GmBU7Smu0XPXotDSWkGhM0tTBdGoBk5TXa62Al1UJZ9T3eFNJIhsjzxGM:JBUOmuzlvAo2c62A/8T38IrM
Malware Config
Signatures
Files
-
cad0a022c7c3076e9cab0424dc91c94d4885bcfebbf21b15057ccc7ab6448f29.exe windows x86
50c384a652c3ed82472dc187c827d385
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegEnumKeyA
RegDeleteValueA
kernel32
GetFileType
ExitProcess
WriteFile
lstrcpyA
GetLastError
VirtualQuery
GetStringTypeA
GetVersionExA
VirtualFree
SetThreadLocale
LoadLibraryA
GetFileSize
LoadResource
ExitThread
WaitForSingleObject
GetACP
GetStdHandle
FindClose
VirtualAllocEx
SetEndOfFile
lstrcmpiA
GetCurrentThreadId
RaiseException
LocalAlloc
GetCurrentThread
GetFullPathNameA
GetVersion
VirtualAlloc
ReadFile
GetModuleHandleA
GetLocaleInfoA
GetSystemDefaultLangID
FindFirstFileA
lstrcmpA
MoveFileExA
CloseHandle
EnterCriticalSection
CreateThread
HeapAlloc
lstrlenA
Sleep
GetProcAddress
GetDiskFreeSpaceA
LockResource
GlobalAddAtomA
GlobalAlloc
LocalFree
GetThreadLocale
SetHandleCount
FormatMessageA
GlobalDeleteAtom
InitializeCriticalSection
GetModuleFileNameA
GetCPInfo
GetCurrentProcess
SetLastError
CompareStringA
GetTickCount
LoadLibraryExA
CreateEventA
GetOEMCP
oleaut32
SysFreeString
SafeArrayCreate
RegisterTypeLib
SafeArrayUnaccessData
VariantCopyInd
shell32
SHFileOperationA
SHGetDesktopFolder
SHGetSpecialFolderLocation
ole32
CoUnmarshalInterface
OleRun
StgCreateDocfileOnILockBytes
CreateStreamOnHGlobal
CreateBindCtx
StringFromIID
CoReleaseMarshalData
CoRegisterClassObject
CLSIDFromString
CLSIDFromProgID
msvcrt
memcpy
atan
memmove
malloc
strncmp
user32
DrawIcon
GetMenuState
GetMenuStringA
GetScrollPos
CallNextHookEx
GetSysColorBrush
SetWindowTextA
GetDC
FillRect
GetActiveWindow
GetDesktopWindow
GetParent
GetWindow
GetScrollRange
GetCursor
DispatchMessageW
DrawEdge
GetSubMenu
EnableMenuItem
GetMessagePos
CreatePopupMenu
GetScrollInfo
GetMenuItemInfoA
IsWindowVisible
EqualRect
CreateIcon
IsChild
IsWindowEnabled
GetWindowTextA
GetPropA
GetSysColor
EnumWindows
GetMenuItemID
DrawMenuBar
comdlg32
ChooseColorA
FindTextA
GetSaveFileNameA
Sections
CODE Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 930B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ