Static task
static1
Behavioral task
behavioral1
Sample
cf80509a737c219a493977c383927ab234b61001fd9264c44c851cd1e9111aae.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cf80509a737c219a493977c383927ab234b61001fd9264c44c851cd1e9111aae.exe
Resource
win10v2004-20220812-en
General
-
Target
cf80509a737c219a493977c383927ab234b61001fd9264c44c851cd1e9111aae
-
Size
236KB
-
MD5
cc7bc8d79f14fdf9940888e422a19898
-
SHA1
726fd75f8d67188483bf69c0f532c4550d4c8905
-
SHA256
cf80509a737c219a493977c383927ab234b61001fd9264c44c851cd1e9111aae
-
SHA512
686de4847a2955e7306c3b3f0f29de832942bc73f99c99f2180b178e6d44bae9277b36e44206423c938881ad722c0d7c66dbc0685bc6afdc6d717bf417588aef
-
SSDEEP
6144:p4H0JcMqF1QTOOcciJyV93BA3qMgNChGMamDG:OH0uMqcyOjsYVBAhgN/ID
Malware Config
Signatures
Files
-
cf80509a737c219a493977c383927ab234b61001fd9264c44c851cd1e9111aae.exe windows x86
e85cfd58a9d911e7055cea8b68ed0244
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_ISOLATION
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
GetProcAddress
RtlZeroMemory
CreateThread
lstrcpyA
WaitForSingleObject
HeapAlloc
LoadLibraryA
ExitProcess
ntdll
_wcsnicmp
user32
OpenClipboard
TranslateMessage
GetMessageA
DispatchMessageW
ole32
CoInitialize
comctl32
ord17
powrprof
GetActivePwrScheme
GetPwrCapabilities
clusapi
ClusterEnum
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 225KB - Virtual size: 225KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE