Static task
static1
Behavioral task
behavioral1
Sample
c5cf268be730409023a47979c3eb53b82b3fb4353ef8a18eb287a03d0dc64a8e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c5cf268be730409023a47979c3eb53b82b3fb4353ef8a18eb287a03d0dc64a8e.exe
Resource
win10v2004-20220812-en
General
-
Target
c5cf268be730409023a47979c3eb53b82b3fb4353ef8a18eb287a03d0dc64a8e
-
Size
173KB
-
MD5
a32fe29b84fdaaeac046e62300d38f44
-
SHA1
628e47d8ebc873213eaf1fa1ac564fefad1e56e6
-
SHA256
c5cf268be730409023a47979c3eb53b82b3fb4353ef8a18eb287a03d0dc64a8e
-
SHA512
945316d4631ac50ac4875953e91c7f5fed45b19a09ba5c56e69b6fd6dd5a3c18ddc2b78e9f27ff0d62d31045903e1d854e692095d366007e2330cac95bb4edfc
-
SSDEEP
3072:OxrMqIqhjZHOLKuI5P9plCDX3cf8ZAt2wHEt5MoLlSrh4koO60CK:OxNBrTPbmM8ZA48Et5LlSrG/v0CK
Malware Config
Signatures
Files
-
c5cf268be730409023a47979c3eb53b82b3fb4353ef8a18eb287a03d0dc64a8e.exe windows x86
452ebf0a1503752e2cc68450f9bbb455
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteConsoleA
FreeLibrary
GlobalGetAtomNameA
GetOEMCP
HeapReAlloc
RtlUnwind
GetCPInfo
GetSystemTimeAsFileTime
IsValidCodePage
GetCurrentProcess
VirtualAlloc
GetTimeFormatA
SetStdHandle
WriteFile
EnumResourceNamesW
GetDateFormatA
TerminateProcess
GetCurrentProcessId
EnterCriticalSection
LoadLibraryA
HeapSize
InitializeCriticalSection
GetStringTypeA
SetFilePointer
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
LeaveCriticalSection
GetLocaleInfoA
GetConsoleOutputCP
UnhandledExceptionFilter
MultiByteToWideChar
RaiseException
rpcrt4
RpcStringFreeA
shlwapi
SHCreateStreamOnFileW
PathIsFileSpecA
PathAppendA
SHCreateStreamOnFileEx
PathIsContentTypeA
PathCreateFromUrlW
Sections
.text Size: 91KB - Virtual size: 487KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ