Static task
static1
Behavioral task
behavioral1
Sample
c0cd95427449a9b894c844b6d2d7e7be3f3027b2ed6cf863b6f365e0f72a57e5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c0cd95427449a9b894c844b6d2d7e7be3f3027b2ed6cf863b6f365e0f72a57e5.exe
Resource
win10v2004-20220812-en
General
-
Target
c0cd95427449a9b894c844b6d2d7e7be3f3027b2ed6cf863b6f365e0f72a57e5
-
Size
271KB
-
MD5
a2c59f12bc27cecf5e5bebd53ec73142
-
SHA1
3440d3ebe60458c9345cf1013d8931b539492496
-
SHA256
c0cd95427449a9b894c844b6d2d7e7be3f3027b2ed6cf863b6f365e0f72a57e5
-
SHA512
9108d1391f9eded5b4787878ae7f64a1ee4184dd5429bd7770d2c185e6b121998528820f4fa8d473a89c9bdb93b04b14861df30031f6a5f0c55f6d77b37071cb
-
SSDEEP
6144:/YLwViVT2YokFBvrpcHowyJB1jNyvyDvMg7afVofG:ALI42R6BvrpcHOvyvBg7awG
Malware Config
Signatures
Files
-
c0cd95427449a9b894c844b6d2d7e7be3f3027b2ed6cf863b6f365e0f72a57e5.exe windows x86
5b00185295c8dad748de15da653fe1b3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memcpy
_CIsinh
longjmp
fopen
_setjmp3
fclose
malloc
free
strlen
exit
__p__iob
fprintf
sprintf
fwrite
fflush
ferror
getenv
sscanf
memmove
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
DeleteFileA
HeapFree
TlsGetValue
HeapAlloc
TlsSetValue
TlsAlloc
HeapReAlloc
WaitForMultipleObjects
EnterCriticalSection
CloseHandle
LeaveCriticalSection
GetCurrentThreadId
InitializeCriticalSection
GetCurrentProcess
GetCurrentThread
DuplicateHandle
CreateSemaphoreA
CreateThread
ReleaseSemaphore
user32
CallWindowProcA
Sections
.code Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_WRITE
.. Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
..aer Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ