Static task
static1
Behavioral task
behavioral1
Sample
1cb2c81e8f62f964174ee95c6119712239b4377ef28c2914eb61be1db4501a81.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1cb2c81e8f62f964174ee95c6119712239b4377ef28c2914eb61be1db4501a81.exe
Resource
win10v2004-20221111-en
General
-
Target
1cb2c81e8f62f964174ee95c6119712239b4377ef28c2914eb61be1db4501a81
-
Size
491KB
-
MD5
bb4e0673d72834a49530971fa87c6676
-
SHA1
f0d69c08d2f8aa3cb3c2680257fa855f1fb8d1c0
-
SHA256
1cb2c81e8f62f964174ee95c6119712239b4377ef28c2914eb61be1db4501a81
-
SHA512
488adf0224b8d3f67a22c2d84bb99c4ba9cbfc7ebf04f7a06934f7f7525ba2baae2e9e77e4d872a506c4033f6ad81320827aedf0f240e4578ac5aa60ab4c5699
-
SSDEEP
6144:qxxhKBgqJMYucH+Sv2UDn+C0jj3+VAurnVv4Ch9s7cae6ZaKSqeABLs1SWcDDDDX:qrhqgqJMaHp27j34GCfs7cafE
Malware Config
Signatures
Files
-
1cb2c81e8f62f964174ee95c6119712239b4377ef28c2914eb61be1db4501a81.exe windows x86
30ff160d7968387a3b439d3aaff7d098
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
GetModuleFileNameW
CreateFileMappingW
TlsAlloc
PulseEvent
Sleep
GetDriveTypeA
GetCommandLineA
CloseHandle
lstrlenA
GetStartupInfoA
IsDebuggerPresent
DeviceIoControl
CloseHandle
ReleaseMutex
CreateFileA
GetModuleHandleA
IsBadStringPtrW
HeapCreate
HeapDestroy
user32
GetIconInfo
IsWindow
DrawTextW
GetWindowLongA
DestroyWindow
DispatchMessageA
DestroyMenu
CallWindowProcW
FindWindowW
PeekMessageA
IsZoomed
LoadImageA
DispatchMessageA
colbact
PartitionAccessCheck
PartitionAccessCheck
PartitionAccessCheck
PartitionAccessCheck
cryptui
CryptUIDlgCertMgr
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 484KB - Virtual size: 483KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ