Static task
static1
Behavioral task
behavioral1
Sample
00cb35af31b3c75643684deb0e6d33ed74f90b12b04dbab9488561d927430cf3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
00cb35af31b3c75643684deb0e6d33ed74f90b12b04dbab9488561d927430cf3.exe
Resource
win10v2004-20221111-en
General
-
Target
00cb35af31b3c75643684deb0e6d33ed74f90b12b04dbab9488561d927430cf3
-
Size
305KB
-
MD5
41f8713d7b66849325b7b4ab3e2947ab
-
SHA1
96eb4dd3c10ddd93e31b9175c7cb50b486cc5217
-
SHA256
00cb35af31b3c75643684deb0e6d33ed74f90b12b04dbab9488561d927430cf3
-
SHA512
970909e8b612f86f076a3539d968c6715acde1efb6b4bd95cf714459b4211be3114edee821a62747fc03b3c2bd3e5303d6e3109aed83c604451150dfbff29a98
-
SSDEEP
6144:DhQwpNRAMKor9HEFkkfXA6aARZfbxvkInxmAgs0Z:DhQ6Na6pkOk/AXARlbVhx7gs0Z
Malware Config
Signatures
Files
-
00cb35af31b3c75643684deb0e6d33ed74f90b12b04dbab9488561d927430cf3.exe windows x86
e627be61c4d29eb599e4dcf61de15bf2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
GetCurrentProcessId
ResumeThread
GetPrivateProfileStringW
TlsGetValue
EnumCalendarInfoW
GetConsoleAliasW
ReadFile
EnterCriticalSection
GetDriveTypeW
GetCurrentThreadId
GetModuleFileNameA
FindAtomW
lstrlenW
SetEvent
GetNumberFormatW
HeapCreate
FindClose
SetLastError
GetModuleHandleA
user32
GetMenuInfo
GetClientRect
GetClassInfoA
GetSysColor
GetKeyState
DrawTextA
DispatchMessageA
GetCursorInfo
DispatchMessageA
SetFocus
CallWindowProcW
GetKeyboardType
IsWindow
wsnmp32
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
SnmpGetTimeout
msasn1
ASN1BERDecBool
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ