Static task
static1
Behavioral task
behavioral1
Sample
cfc04a913144125cb46eaecef133ca05191e2090cf74e9e127045b867d2c2b90.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cfc04a913144125cb46eaecef133ca05191e2090cf74e9e127045b867d2c2b90.exe
Resource
win10v2004-20220812-en
General
-
Target
cfc04a913144125cb46eaecef133ca05191e2090cf74e9e127045b867d2c2b90
-
Size
391KB
-
MD5
9c4adc942101e0b7d4fa26d0498668f1
-
SHA1
f2e28aa19df3a7a5d6b52502fbf2f7309fb2aeda
-
SHA256
cfc04a913144125cb46eaecef133ca05191e2090cf74e9e127045b867d2c2b90
-
SHA512
4fd96be3f2100a1bab8b69d6dca230fd627431be938005990909323b3f98e8e7b3b79c1abc27e8a66c1d80b97927b3aa40f9a243a6848c1a7e6e34c5f4bca2cc
-
SSDEEP
12288:5iRMUHEAJLjpFv6w2K/PkFtlVMHFWg1EOfoMzCc3Sa0n:5iRMUkAJLjpFvN/ytkjEOfoMWN
Malware Config
Signatures
Files
-
cfc04a913144125cb46eaecef133ca05191e2090cf74e9e127045b867d2c2b90.exe windows x86
7dfe6a4349ea46f413162bc60b4f3cea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
LoadLibraryW
ReleaseMutex
FindClose
TlsGetValue
InitializeCriticalSection
WriteFile
ReleaseMutex
GetFileTime
GetDriveTypeA
FindAtomA
GetPrivateProfileStringA
IsBadStringPtrW
GetCurrentThreadId
GlobalFlags
GetCurrentProcessId
GetEnvironmentVariableW
lstrlenW
HeapCreate
CreateEventW
user32
DrawTextA
GetSysColor
DrawStateW
CreateWindowExA
GetKeyboardType
IsWindow
GetClientRect
GetSysColor
DispatchMessageA
EndDialog
CallWindowProcW
GetClassInfoA
SetFocus
rastapi
DeviceDone
DeviceDone
DeviceDone
DeviceDone
DeviceDone
advapi32
InitializeSid
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 404KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 381KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ