Static task
static1
Behavioral task
behavioral1
Sample
cda8c15f638d82c0600596753d9260fe3d7c44d00a0cfdd56ab0aaae9105e7cd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cda8c15f638d82c0600596753d9260fe3d7c44d00a0cfdd56ab0aaae9105e7cd.exe
Resource
win10v2004-20220901-en
General
-
Target
cda8c15f638d82c0600596753d9260fe3d7c44d00a0cfdd56ab0aaae9105e7cd
-
Size
374KB
-
MD5
8473631f79aeb795cca2183230f61df0
-
SHA1
76fc7c7ae259e65b5fd974a1c5593a2350a5e121
-
SHA256
cda8c15f638d82c0600596753d9260fe3d7c44d00a0cfdd56ab0aaae9105e7cd
-
SHA512
e2577854705e5d42ba362d3ad9bca482524dbcac32edf97d4f09ed975a64e2735871559282a0fe2aff1dcfe70d1fb4543a785dff3351e1129e52f98e33c4ae99
-
SSDEEP
6144:RjA/RMUKP9EoxGcTYNh91DQJ7w6Mcx8MYeWKnEWYzXTz+VNypJOVglH5fDsf1KpU:URMCL9/u5Wcxr8/frTzcNS0G3fDsf1YU
Malware Config
Signatures
Files
-
cda8c15f638d82c0600596753d9260fe3d7c44d00a0cfdd56ab0aaae9105e7cd.exe windows x86
fa5a9161458656854ff90e3f9cc15713
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
ResumeThread
InitializeCriticalSection
SuspendThread
TlsGetValue
FindAtomA
CreateEventW
FindClose
GetDriveTypeW
LoadLibraryW
GetConsoleAliasA
LocalFlags
HeapCreate
LocalFree
GetCurrentThreadId
GetPrivateProfileStringA
lstrlenW
GetCurrentProcessId
GetEnvironmentVariableW
GetNumberFormatA
user32
SetFocus
GetClientRect
IsWindow
EndDialog
DispatchMessageA
CreateWindowExA
GetClassInfoA
DrawStateW
DrawTextA
GetSysColor
CallWindowProcW
GetKeyboardType
GetSysColor
srclient
EnableSR
EnableSR
EnableSR
EnableSR
EnableSR
clbcatq
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 484KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 364KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ