Static task
static1
Behavioral task
behavioral1
Sample
cbdca9210d2a10576d876ad049dd8009e9af013ae61aba60d98dce1c0f2d45cc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cbdca9210d2a10576d876ad049dd8009e9af013ae61aba60d98dce1c0f2d45cc.exe
Resource
win10v2004-20220812-en
General
-
Target
cbdca9210d2a10576d876ad049dd8009e9af013ae61aba60d98dce1c0f2d45cc
-
Size
396KB
-
MD5
28cd304c2731bd32a46203da0875fe00
-
SHA1
2d58c74320f9422f75968a94e76467606308b19a
-
SHA256
cbdca9210d2a10576d876ad049dd8009e9af013ae61aba60d98dce1c0f2d45cc
-
SHA512
20e4f2b64a818b249930859a5797feb664fb40a4378fc74c6336a9b3d2cc054d89cf9ae70a1bf952f73a5e16742516b1e7c9b1c733e8c9c5c1a5a928e229c90d
-
SSDEEP
6144:v2Uqol32GmCwt3Ncm1pR2tVAdNqDMYD6k6F1+B8yzxmnvwlKfHh:v2UbdA3NcGutVAdEDMFhFeEnvwS
Malware Config
Signatures
Files
-
cbdca9210d2a10576d876ad049dd8009e9af013ae61aba60d98dce1c0f2d45cc.exe windows x86
191a7de5924c44019eab878e7f3d09d4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetComputerNameA
ResetEvent
HeapCreate
CreateFileW
LoadLibraryW
GlobalUnlock
UnmapViewOfFile
PulseEvent
GetSystemTime
GetTickCount
LocalFree
CreateThread
lstrcpyA
lstrlenA
Sleep
GetCommandLineW
GetCurrentDirectoryA
CloseHandle
FindClose
user32
FillRect
CheckRadioButton
CreateWindowExA
GetDlgItem
GetDC
DispatchMessageA
DrawMenuBar
CallWindowProcA
IsWindow
GetKeyState
DrawEdge
GetScrollBarInfo
SetFocus
cryptui
CryptUIDlgCertMgr
LocalEnroll
WizardFree
CryptUIDlgSelectCA
CryptUIDlgSelectStoreA
timedate.cpl
CPlApplet
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 396KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 371KB - Virtual size: 372KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ