Static task
static1
Behavioral task
behavioral1
Sample
cdb847d1f1a4d6743785d785f925a359c40a9faa9d4b08e58a8258b7fe9a2a07.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cdb847d1f1a4d6743785d785f925a359c40a9faa9d4b08e58a8258b7fe9a2a07.exe
Resource
win10v2004-20220812-en
General
-
Target
cdb847d1f1a4d6743785d785f925a359c40a9faa9d4b08e58a8258b7fe9a2a07
-
Size
295KB
-
MD5
357f992c74c7f7d25ebc28793f267254
-
SHA1
02cc4b6da398dd1b47eefe36b5a59eb855dc2b88
-
SHA256
cdb847d1f1a4d6743785d785f925a359c40a9faa9d4b08e58a8258b7fe9a2a07
-
SHA512
46e1c321865fe6e1c5e02ce1ccd4d78ccf68d83751b7871f6b8caa7cd327c5b22d2f18807343ba5529c46df467f7abb06fe73d99d3a8562ac11892a751cb1776
-
SSDEEP
6144:9v7p9hUv4xKcBOavPDp3Zgc/ockQ3t3ypLodaQSaQ4:ddOvcNvPD3V/LkQypUdtSt4
Malware Config
Signatures
Files
-
cdb847d1f1a4d6743785d785f925a359c40a9faa9d4b08e58a8258b7fe9a2a07.exe windows x86
0da089fd6987158380c210589076c162
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
WaitForSingleObject
SetEvent
FreeLibrary
CloseHandle
Sleep
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
GetLastError
ResetEvent
GetTickCount
InterlockedExchange
CancelIo
GetLocalTime
GetCurrentProcessId
DeleteFileA
CreateDirectoryA
GetFileAttributesA
lstrcpyA
lstrlenA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
LocalReAlloc
LocalAlloc
GetFileSize
ReadFile
SetFilePointer
MoveFileA
lstrcatA
CreateProcessA
InitializeCriticalSection
lstrcmpiA
MapViewOfFile
CreateFileMappingA
HeapFree
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
WaitForMultipleObjects
LocalSize
TerminateProcess
OpenProcess
GetCurrentThreadId
GetSystemInfo
GetComputerNameA
GetVersionExA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcess
HeapAlloc
GetProcessHeap
InterlockedDecrement
OpenEventA
SetErrorMode
MultiByteToWideChar
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
GetUserDefaultLCID
EnumSystemLocalesA
lstrlenW
SetEnvironmentVariableA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
LCMapStringW
RtlUnwind
RaiseException
CreateThread
TlsSetValue
TlsGetValue
ExitThread
GetModuleHandleA
GetCommandLineA
GetVersion
ExitProcess
TlsAlloc
TlsFree
SetLastError
GetCurrentThread
FatalAppExitA
SetUnhandledExceptionFilter
GetModuleFileNameA
GetEnvironmentVariableA
HeapDestroy
HeapCreate
HeapReAlloc
IsBadWritePtr
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
WriteFile
IsBadReadPtr
IsBadCodePtr
InterlockedIncrement
GetStringTypeA
GetStringTypeW
GetCPInfo
GetACP
GetOEMCP
FlushFileBuffers
SetStdHandle
SetConsoleCtrlHandler
LCMapStringA
CompareStringW
ole32
CoCreateInstance
OleRun
CLSIDFromString
CoInitialize
CoUninitialize
CLSIDFromProgID
oleaut32
VariantClear
SysFreeString
SysAllocString
GetErrorInfo
SetErrorInfo
VariantInit
VariantChangeType
CreateErrorInfo
Sections
.text Size: 166KB - Virtual size: 166KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ