Static task
static1
Behavioral task
behavioral1
Sample
cabea18adcda373d86f26c10fb3ee4bda229a61fc6f4a01c9e0250dc49f6b864.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cabea18adcda373d86f26c10fb3ee4bda229a61fc6f4a01c9e0250dc49f6b864.exe
Resource
win10v2004-20221111-en
General
-
Target
cabea18adcda373d86f26c10fb3ee4bda229a61fc6f4a01c9e0250dc49f6b864
-
Size
501KB
-
MD5
c6dfa6cb2bd2280471ab1990b648f1ca
-
SHA1
4c4bcbd5ac0a394ee78de82e0b5716bb8b8aaa5e
-
SHA256
cabea18adcda373d86f26c10fb3ee4bda229a61fc6f4a01c9e0250dc49f6b864
-
SHA512
1ae95ff5680b1dc02e5f1ac939b3df73cc231792a551f093681fdd8f03fd604c699e5ac9387863f0297f12a5e7af8c231064006ed9e787ddb9830da4d19c6225
-
SSDEEP
12288:c1aZDfBeRmLfNXtHnmCqEDDciwbzNrjT653xFEZ:cerDf/mCqEDDcbluBFEZ
Malware Config
Signatures
Files
-
cabea18adcda373d86f26c10fb3ee4bda229a61fc6f4a01c9e0250dc49f6b864.exe windows x86
cdf85d3c87243bb8390d7f0442e44299
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetFileTitleW
FindTextA
ReplaceTextA
gdi32
CreatePalette
GetTextExtentPointA
SetStretchBltMode
GetTextExtentExPointA
comctl32
InitCommonControlsEx
shell32
SheChangeDirA
SHGetSpecialFolderLocation
DragAcceptFiles
DragQueryPoint
kernel32
VirtualAlloc
GetModuleFileNameA
IsValidLocale
GetSystemInfo
LeaveCriticalSection
HeapReAlloc
GetDateFormatA
GetCommandLineW
RtlUnwind
GetTimeZoneInformation
GetProcAddress
HeapSize
SetLocaleInfoA
GetStdHandle
GetTimeFormatA
GetModuleFileNameW
TlsAlloc
GetModuleHandleA
FlushFileBuffers
GetStartupInfoA
HeapDestroy
DeleteCriticalSection
ReadFile
GetStartupInfoW
TerminateProcess
InitializeCriticalSection
SetFilePointer
SetEnvironmentVariableA
GetLocaleInfoW
GetFileType
GetCurrentProcessId
EnumDateFormatsExA
GetTickCount
CompareStringW
LoadLibraryA
WriteFile
LCMapStringW
SetStdHandle
SetLastError
MultiByteToWideChar
CompareStringA
GetStringTypeW
GetStringTypeA
InterlockedExchange
GetLocaleInfoA
HeapCreate
TlsGetValue
VirtualFree
VirtualQuery
GetCurrentThread
OpenMutexA
TlsSetValue
FreeEnvironmentStringsA
GetCurrentThreadId
GetSystemTimeAsFileTime
HeapAlloc
GetOEMCP
ExitProcess
GetLastError
GetVersionExA
UnhandledExceptionFilter
GetACP
FreeEnvironmentStringsW
GetUserDefaultLCID
EnumSystemLocalesA
HeapFree
TlsFree
EnterCriticalSection
QueryPerformanceCounter
IsValidCodePage
IsBadWritePtr
GetEnvironmentStrings
CloseHandle
VirtualProtect
LCMapStringA
GetCommandLineA
CreateMutexA
GetEnvironmentStringsW
WideCharToMultiByte
SetHandleCount
GetCPInfo
GetCurrentProcess
user32
RegisterClassA
UnhookWinEvent
TranslateAcceleratorW
DdeConnectList
RegisterClassExA
CharPrevA
DdeClientTransaction
SendDlgItemMessageA
Sections
.text Size: 316KB - Virtual size: 316KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 65KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ