Static task
static1
Behavioral task
behavioral1
Sample
cb84a6aff5ed0f24b71889d001b8cebe459097a793e01f11943819038ff1688f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cb84a6aff5ed0f24b71889d001b8cebe459097a793e01f11943819038ff1688f.exe
Resource
win10v2004-20220812-en
General
-
Target
cb84a6aff5ed0f24b71889d001b8cebe459097a793e01f11943819038ff1688f
-
Size
304KB
-
MD5
ab145f6b2214418834a1babd911d0a3d
-
SHA1
a89fb3c9d553fa35723a540b03a2a04f3a539642
-
SHA256
cb84a6aff5ed0f24b71889d001b8cebe459097a793e01f11943819038ff1688f
-
SHA512
b507d3c5c9599ef2d1885a66699f55e9bd6539d50fe799461f71f9943136c97b8b4eebd3baeca67e130c14bc6a4709e934020b416ac3e18fd0c06d5f7f2dcd41
-
SSDEEP
6144:TSNIjxD00rZdMof3zTFk+7M+B5++IQ7Ii4RFllsxuERH1kkcL2OhxmQZXu:2NIy4x/zTFk+79BWQklsxuEPkkqhJp
Malware Config
Signatures
Files
-
cb84a6aff5ed0f24b71889d001b8cebe459097a793e01f11943819038ff1688f.exe windows x86
4b2a23954bbbaa72ed9d5bc3ba40ba05
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedExchange
ReleaseMutex
ReadFile
GetPrivateProfileIntW
ResetEvent
LocalSize
FreeConsole
VirtualAlloc
GetExitCodeProcess
GetMailslotInfo
CreateFileW
GlobalFree
lstrlenA
GetDriveTypeW
GetACP
GetModuleHandleW
CreateThread
FindVolumeClose
CloseHandle
LocalFree
user32
GetSysColor
GetCursorInfo
GetDlgItem
GetClientRect
CallWindowProcW
EndDialog
GetKeyboardType
SetFocus
IsIconic
DrawStateW
CreateWindowExA
DispatchMessageA
GetClassInfoA
dsprop
CheckADsError
CheckADsError
CheckADsError
CheckADsError
ReportError
desk.cpl
InstallScreenSaverW
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ