Static task
static1
Behavioral task
behavioral1
Sample
cfbb19d09de1c6331bb8db2a4f23cd29b484d1ee7d6c992372ef86bd0990f497.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cfbb19d09de1c6331bb8db2a4f23cd29b484d1ee7d6c992372ef86bd0990f497.exe
Resource
win10v2004-20220812-en
General
-
Target
cfbb19d09de1c6331bb8db2a4f23cd29b484d1ee7d6c992372ef86bd0990f497
-
Size
352KB
-
MD5
ab916b2c0fcb0ef34ba295daee8fb52a
-
SHA1
5787370d1c7a648b2d2d823d51727ffa6b27f615
-
SHA256
cfbb19d09de1c6331bb8db2a4f23cd29b484d1ee7d6c992372ef86bd0990f497
-
SHA512
d2a819d4a7d2510125bd7c6b2b1ad4319477d3be85547da757211b5997e8b3f3d5338fb566f7e49be9ab3a06e608ea9100ad4d9640e94fcea2d9664d7c20d737
-
SSDEEP
6144:7BTeigL5T1wHNltwjj/FECqznq0eYX47KJNmttrCcKcEF3:7BaigLRSXCjuCqqt/KXF3
Malware Config
Signatures
Files
-
cfbb19d09de1c6331bb8db2a4f23cd29b484d1ee7d6c992372ef86bd0990f497.exe windows x86
b6ce6f3a8af175cabf5a1d58fc1a2169
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventA
CreateMutexA
GetCurrentThread
GetVersionExA
GetProcAddress
LoadLibraryA
GetStdHandle
GetWindowsDirectoryA
VirtualProtect
GetSystemDirectoryA
LockResource
LoadResource
FindResourceA
LocalFree
GetCurrentProcessId
ExitProcess
VirtualAlloc
GetCurrentThreadId
LocalAlloc
GetCurrentProcess
GetCurrentDirectoryA
advapi32
GetUserNameA
user32
GetForegroundWindow
GetActiveWindow
GetSystemMetrics
msvcrt
memcpy
memset
wcslen
wcsncpy
Sections
.text Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 14B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 318KB - Virtual size: 317KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ