Static task
static1
Behavioral task
behavioral1
Sample
cd040be8cc5b4aab3cd05112d6d3c60b505f5c030c6040df185c5ca5d2d0bbb4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cd040be8cc5b4aab3cd05112d6d3c60b505f5c030c6040df185c5ca5d2d0bbb4.exe
Resource
win10v2004-20221111-en
General
-
Target
cd040be8cc5b4aab3cd05112d6d3c60b505f5c030c6040df185c5ca5d2d0bbb4
-
Size
81KB
-
MD5
2aaea06a1b52479c8229517344c73dc1
-
SHA1
0e5167949f34bbe934351b37405c4f30056a8e94
-
SHA256
cd040be8cc5b4aab3cd05112d6d3c60b505f5c030c6040df185c5ca5d2d0bbb4
-
SHA512
2ae30c8cfd555bcea8dd65e514d0963b4270aa1391fa77e0e2ec922bb9edad50c8eb1ae9d0ad08e26e19d09d75381e6a52e37e7599716dd773b2fe9542cb3edf
-
SSDEEP
1536:d8HgXfYxdJfYZOgKFkKGaVFk6hJdJKbrk+P0lZtdEPyhqa2dQl:ExrfIOzCKGaVrXALslZtdEPyhqa6o
Malware Config
Signatures
Files
-
cd040be8cc5b4aab3cd05112d6d3c60b505f5c030c6040df185c5ca5d2d0bbb4.exe windows x86
797eef0b19f46c5b9ab86fc74388104c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathRemoveFileSpecW
PathFileExistsW
PathAppendW
PathGetArgsW
kernel32
CreateProcessW
GetModuleFileNameW
lstrlenW
lstrlenA
WaitForSingleObject
GetExitCodeProcess
GetCurrentProcessId
LocalFree
GetCommandLineW
SetStdHandle
WriteConsoleW
CloseHandle
FlushFileBuffers
HeapReAlloc
GetConsoleMode
GetConsoleCP
LocalAlloc
GetProcAddress
FreeLibrary
InterlockedExchange
GetLastError
LoadLibraryA
RaiseException
ReleaseSemaphore
GetCurrentThreadId
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcess
VirtualQuery
CreateFileW
SetUnhandledExceptionFilter
RtlCaptureContext
InterlockedDecrement
DeleteCriticalSection
LoadLibraryW
CreateThread
CreateSemaphoreW
InitializeCriticalSection
InterlockedIncrement
WaitNamedPipeW
WaitForMultipleObjects
SetEvent
ResetEvent
WriteFile
TransactNamedPipe
SetNamedPipeHandleState
GetTempPathW
UnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
HeapSetInformation
GetStartupInfoW
GetModuleHandleW
ExitProcess
HeapFree
IsProcessorFeaturePresent
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
HeapCreate
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
Sleep
HeapSize
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
RtlUnwind
SetFilePointer
advapi32
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
ole32
CoUninitialize
CoInitialize
CoCreateInstance
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ