Static task
static1
Behavioral task
behavioral1
Sample
cd4262c7dfbc973cb01883e96edfff79a0abacf5054a807ff8087f64a9c3c89b.exe
Resource
win7-20220812-en
General
-
Target
cd4262c7dfbc973cb01883e96edfff79a0abacf5054a807ff8087f64a9c3c89b
-
Size
451KB
-
MD5
4815f18780d3f4339a577793a41f0daa
-
SHA1
3331e9d302f962b4d95cbe8f492ddab9626f768c
-
SHA256
cd4262c7dfbc973cb01883e96edfff79a0abacf5054a807ff8087f64a9c3c89b
-
SHA512
7e9370c79570b7472554447b75b54cb46045a7e927ca93403b1ee0ef8551119a4d03d6a297cb7a5e7355e07fb5ba66a4eabd9e55d44dea3fe00cd870ef9fbc95
-
SSDEEP
12288:HsOiDUZx9JdnrCHZSNY2KtRboouqDL3nEP:M5DUz9Jx448poou2DO
Malware Config
Signatures
Files
-
cd4262c7dfbc973cb01883e96edfff79a0abacf5054a807ff8087f64a9c3c89b.exe windows x86
2e0edc215c569349c418e61c9aa432b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryA
Sleep
CloseHandle
DeleteFileA
CreateDirectoryA
GetTempPathA
ReadFile
SetFilePointer
GetFileSize
GetLastError
CreateFileA
GetModuleFileNameA
SetLastError
GetCommandLineA
WritePrivateProfileStringA
LocalFree
FormatMessageA
GetTempFileNameA
WriteFile
GetExitCodeProcess
OpenProcess
CreateProcessA
HeapAlloc
GetProcessHeap
HeapFree
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
user32
SetCursor
LoadCursorA
DispatchMessageA
PeekMessageA
wsprintfA
MessageBoxA
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE