Static task
static1
Behavioral task
behavioral1
Sample
cf231c665bd598392a1e7f33a187f2f52eb502ef76bc60256b3a8069bc249f1a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cf231c665bd598392a1e7f33a187f2f52eb502ef76bc60256b3a8069bc249f1a.exe
Resource
win10v2004-20221111-en
General
-
Target
cf231c665bd598392a1e7f33a187f2f52eb502ef76bc60256b3a8069bc249f1a
-
Size
76KB
-
MD5
26766183d64b3b75ce323258e9fda7cb
-
SHA1
12fc16380f4b7a2ce13dce2438357d8f2c966ce5
-
SHA256
cf231c665bd598392a1e7f33a187f2f52eb502ef76bc60256b3a8069bc249f1a
-
SHA512
e96c602fe1bbca9ecf8d50163acdb9824c930fd08556910b9e82bdfa569289c2d781e4cd18c4eaac3f7925365b5c010c15298997bde5c339238d55b0fe805dea
-
SSDEEP
1536:sBbjylfnjG4pOOHYB36XwO0HzZC9Ji0w6S/eUv8BtrTKvoPOOAWp:kkfEaYFodS1vCbPvAWp
Malware Config
Signatures
Files
-
cf231c665bd598392a1e7f33a187f2f52eb502ef76bc60256b3a8069bc249f1a.exe windows x86
763c37edbfc1d56cabc44a325a54538c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LockResource
SuspendThread
CreateProcessW
FindNextFileW
WideCharToMultiByte
LoadLibraryA
SetEndOfFile
FreeResource
CancelWaitableTimer
QueryDosDeviceW
FindResourceExW
CreateThread
GetModuleFileNameW
DeleteFileW
InterlockedDecrement
CreateWaitableTimerW
ResumeThread
WriteFile
GetSystemTime
GetPrivateProfileStringW
WaitForMultipleObjects
ReadProcessMemory
GetLocalTime
MulDiv
GetTickCount
GetProcAddress
user32
SetWindowTextW
LoadIconW
CreatePopupMenu
LoadStringW
SystemParametersInfoW
CreateWindowExW
GetWindowRect
GetClassNameW
UpdateWindow
OffsetRect
PostMessageW
DrawTextW
AppendMenuW
GetDlgItem
ReleaseCapture
SetForegroundWindow
TrackPopupMenu
SendMessageW
Sections
.edisuv Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.etotvjv Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.yfppaf Size: 4KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE