Static task
static1
Behavioral task
behavioral1
Sample
cb0cb32c19d83dab32d5be85dae80aa07c56cdbc6aca0579f1a258b23b933080.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cb0cb32c19d83dab32d5be85dae80aa07c56cdbc6aca0579f1a258b23b933080.exe
Resource
win10v2004-20220812-en
General
-
Target
cb0cb32c19d83dab32d5be85dae80aa07c56cdbc6aca0579f1a258b23b933080
-
Size
69KB
-
MD5
8a455d87b8f7c52d565d55323bcdd099
-
SHA1
38f7206bf46ed47ac80bf46b22177e6c0c21981f
-
SHA256
cb0cb32c19d83dab32d5be85dae80aa07c56cdbc6aca0579f1a258b23b933080
-
SHA512
70c06bdc1187cbbf8cf5fb48da9144db4fcf7ebac7dbd6d8dce445aa158ec51bd3366a69a10be2eb7372f51863d852d398c73338feb9de8d7ca6345fc5830b83
-
SSDEEP
1536:UNU6hr4MNPj6Gbe95wIB07+V4MoJJdN8FT5p:UmHGa9DO+Eb/8FH
Malware Config
Signatures
Files
-
cb0cb32c19d83dab32d5be85dae80aa07c56cdbc6aca0579f1a258b23b933080.exe windows x86
80a5b684d04a0b1da731546b2db28916
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
RemoveDirectoryA
GetLocaleInfoW
GetModuleHandleA
GetCurrentThread
SetHandleCount
VirtualProtect
GetConsoleMode
GlobalReAlloc
DeleteFileA
CopyFileA
GetModuleFileNameA
GetTempPathA
WriteConsoleA
CreateProcessA
GetStartupInfoA
RaiseException
GetCommandLineA
lstrcatA
GetExitCodeProcess
WaitForSingleObject
LCMapStringW
GetProcAddress
LoadResource
GetThreadLocale
GetFileType
lstrlenA
RtlMoveMemory
SizeofResource
msvcrt
_controlfp
_except_handler3
__getmainargs
_adjust_fdiv
_initterm
__set_app_type
_exit
_XcptFilter
__p___initenv
__p__fmode
__p__commode
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ