Static task
static1
Behavioral task
behavioral1
Sample
c97440b8272098fb44cadadebcb0cf18c8082882a644c185f1fff3ff2301ff85.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c97440b8272098fb44cadadebcb0cf18c8082882a644c185f1fff3ff2301ff85.exe
Resource
win10v2004-20220812-en
General
-
Target
c97440b8272098fb44cadadebcb0cf18c8082882a644c185f1fff3ff2301ff85
-
Size
498KB
-
MD5
c432ffb9299912ba32b47b9eee4573b4
-
SHA1
c467143a8a62d3874f5868eea611e96ef83ed1e8
-
SHA256
c97440b8272098fb44cadadebcb0cf18c8082882a644c185f1fff3ff2301ff85
-
SHA512
73a39d245f99df6209de856fd8873885022dc397c3c650105507f401f99844dcaa2b52bcad2fdb7d0cca4f40083d125848c9ddf69dcebade5d8a4110bcffc530
-
SSDEEP
6144:KoEhKBgqJMYucH+Sv2UDn+C0jj3+VAurnVv4Ch9s7cae6ZaKSqeABLs1SWcDDDDX:4hqgqJMaHp27j34GCfs7cafE
Malware Config
Signatures
Files
-
c97440b8272098fb44cadadebcb0cf18c8082882a644c185f1fff3ff2301ff85.exe windows x86
0e0d3db314c3887586e724d3c8bcd70d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
HeapDestroy
DeleteFileA
CreateFileA
GetStartupInfoA
GetDriveTypeA
IsDebuggerPresent
CloseHandle
CloseHandle
DeviceIoControl
lstrlenA
TlsAlloc
Sleep
IsBadStringPtrW
HeapCreate
ReleaseMutex
PulseEvent
CreateFileMappingW
GetModuleFileNameW
GetModuleHandleA
user32
GetWindowLongA
LoadImageA
PeekMessageA
GetIconInfo
CallWindowProcW
IsWindow
DestroyMenu
DrawTextW
IsZoomed
DestroyWindow
DispatchMessageA
DispatchMessageA
FindWindowW
colbact
PartitionAccessCheck
PartitionAccessCheck
PartitionAccessCheck
PartitionAccessCheck
cryptui
CryptUIDlgCertMgr
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 408KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 491KB - Virtual size: 490KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ