Static task
static1
Behavioral task
behavioral1
Sample
cb56181b14cd0ef2574ab199952d3ebc23ba458cb70243b3dfa4e93462e1230c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb56181b14cd0ef2574ab199952d3ebc23ba458cb70243b3dfa4e93462e1230c.exe
Resource
win10v2004-20220812-en
General
-
Target
cb56181b14cd0ef2574ab199952d3ebc23ba458cb70243b3dfa4e93462e1230c
-
Size
13KB
-
MD5
16774e403c5174d9bbfb1530268576ad
-
SHA1
7dc61a40c84df159285f39a8f89abc3bb56fb6e5
-
SHA256
cb56181b14cd0ef2574ab199952d3ebc23ba458cb70243b3dfa4e93462e1230c
-
SHA512
9f60414c75b4c356415060ccde53d90ccca7723a712a3792bcaa7790bbaee732f05746a94ace53c28d686b254769e86da0642b2546d46d2d2060b09d9bb773b8
-
SSDEEP
384:AQPMzcTaMkoq4BUzK3auF+uX1Y/Nvkn3vndKc2gBST:AhM+mh3auZgM3/UDgBS
Malware Config
Signatures
Files
-
cb56181b14cd0ef2574ab199952d3ebc23ba458cb70243b3dfa4e93462e1230c.exe windows x86
4e61de489d253dae75eeebda56e2c70c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
crtdll
memset
strncpy
strlen
memcpy
strcat
kernel32
GetModuleHandleA
HeapCreate
GetCurrentProcessId
HeapDestroy
ExitProcess
GetModuleFileNameA
GetShortPathNameA
CreateProcessA
CloseHandle
GetSystemDirectoryA
GetLastError
GetTickCount
HeapAlloc
HeapFree
FreeLibrary
LoadLibraryA
GetProcAddress
DeleteFileA
GetDriveTypeA
FindFirstFileA
FindClose
GetFileAttributesA
WriteFile
CreateFileA
GetFileSize
SetFilePointer
ReadFile
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
TlsAlloc
TlsGetValue
HeapReAlloc
TlsSetValue
Sections
.code Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.flat Size: 512B - Virtual size: 263B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE