Static task
static1
Behavioral task
behavioral1
Sample
cd0cfc3646f90bbf06efcafbffbc7c8ec7b4fb3285dca1639d15dfa469995a97.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cd0cfc3646f90bbf06efcafbffbc7c8ec7b4fb3285dca1639d15dfa469995a97.exe
Resource
win10v2004-20220812-en
General
-
Target
cd0cfc3646f90bbf06efcafbffbc7c8ec7b4fb3285dca1639d15dfa469995a97
-
Size
52KB
-
MD5
3f8a14136691e7fb1832c9927539c9a7
-
SHA1
909a4afe98b5d849d0a0e3c38c440c79e5e6ebdf
-
SHA256
cd0cfc3646f90bbf06efcafbffbc7c8ec7b4fb3285dca1639d15dfa469995a97
-
SHA512
4df1a6a3bc4995c0c6510398e56ce74d6716f4f1dab9d9aed8eb5a7ab93021193252ccb1eb5c57f929a503ba58598edfdad339365ba34e1e54face78c9efb053
-
SSDEEP
768:whrt8jxQlJyo8QefQP4faeJzWlf99DrFrY3zF1ks/8eoJr+X/O5f5Oi:UwxGJlnek4CXF9DrFM1HzoJr+POTOi
Malware Config
Signatures
Files
-
cd0cfc3646f90bbf06efcafbffbc7c8ec7b4fb3285dca1639d15dfa469995a97.exe windows x86
bcab20977096eb16c3aef8d01823f61b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
CloseHandle
Process32First
CreateToolhelp32Snapshot
TerminateThread
Sleep
WaitForSingleObject
CreateThread
GetLastError
CopyFileA
SetFileAttributesA
GetFileAttributesA
lstrcmpiA
GetTempPathA
GetModuleFileNameA
GetModuleHandleA
ExitProcess
WriteFile
CreateFileA
ExpandEnvironmentStringsA
ExitThread
GetSystemDefaultLangID
GlobalUnlock
TerminateProcess
GlobalAlloc
lstrlenA
CreateDirectoryA
lstrcatA
GetDriveTypeA
GetLogicalDriveStringsA
CreateProcessA
CreateMutexA
SetErrorMode
IsBadCodePtr
SetUnhandledExceptionFilter
RaiseException
LocalFree
ReadFile
SetEndOfFile
LoadLibraryA
GetProcAddress
GetOEMCP
GetACP
GetCPInfo
Process32Next
GetSystemInfo
GetVersionExA
GetLocaleInfoA
GlobalLock
GetTickCount
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetStdHandle
SetFilePointer
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
HeapReAlloc
VirtualAlloc
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetVersion
HeapAlloc
GetStartupInfoA
GetCommandLineA
user32
keybd_event
ShowWindow
OpenClipboard
SetForegroundWindow
BlockInput
CloseClipboard
SetFocus
SetClipboardData
EmptyClipboard
wsprintfA
FindWindowA
VkKeyScanA
advapi32
RegCreateKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegDeleteKeyA
shell32
ShellExecuteA
ole32
CoCreateInstance
CoInitialize
CoUninitialize
oleaut32
VariantClear
VariantInit
SysAllocString
ws2_32
connect
ioctlsocket
recv
gethostbyname
inet_addr
getsockname
closesocket
WSACleanup
WSAStartup
select
socket
htons
send
shlwapi
PathRemoveFileSpecA
urlmon
URLDownloadToFileA
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE