Static task
static1
Behavioral task
behavioral1
Sample
cd98124dcd7099fb6ccffef815977cebab7333df6c0eaa3aec11c5d0e70df5ef.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cd98124dcd7099fb6ccffef815977cebab7333df6c0eaa3aec11c5d0e70df5ef.exe
Resource
win10v2004-20221111-en
General
-
Target
cd98124dcd7099fb6ccffef815977cebab7333df6c0eaa3aec11c5d0e70df5ef
-
Size
44KB
-
MD5
27f05b76b7fe2330f8553cd473daf6d7
-
SHA1
3b1e9f6adb196af790286079e34c7d2ace12ae4f
-
SHA256
cd98124dcd7099fb6ccffef815977cebab7333df6c0eaa3aec11c5d0e70df5ef
-
SHA512
c81a1cb0b45069b42d4ecb1938fded6c576a621be01267b112cdc0ea7531b9dfa3d5033030dd227db0ef4c5fc99bc584f39570bf25765c354526618877893f26
-
SSDEEP
768:123nC6vbMALfXrBSfFdB7dZNFkZ6G86sb8a9yq0QnpXZiRMMqvWoi4H1FmA0D8RC:03C6TjLfXrBMdXkgG8Ci0QnpIRLqeoiR
Malware Config
Signatures
Files
-
cd98124dcd7099fb6ccffef815977cebab7333df6c0eaa3aec11c5d0e70df5ef.exe windows x86
bf61551566b5382cc002a3c2a5c3346e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeviceIoControl
ExitProcess
FatalExit
FindAtomA
GetCurrentDirectoryA
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetProcAddress
GetThreadContext
CreateThread
GetVersionExA
GlobalDeleteAtom
GlobalFindAtomA
InitAtomTable
IsDebuggerPresent
OutputDebugStringA
ReadFile
Sleep
VirtualAlloc
VirtualFree
VirtualProtect
WriteFile
CreateFileA
CopyFileA
CloseHandle
GetTickCount
AddAtomA
wsock32
WSAStartup
WSACleanup
gethostbyname
user32
EnableWindow
GetActiveWindow
GetFocus
GetKeyState
GetKeyboardLayoutList
MapVirtualKeyA
keybd_event
gdi32
CreateCompatibleDC
GetFontData
GetTextAlign
CancelDC
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE