Static task
static1
Behavioral task
behavioral1
Sample
cbd23a18f418b6c39d5506cd18cb9440fcf73afbf0b936486eebe0598568a622.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cbd23a18f418b6c39d5506cd18cb9440fcf73afbf0b936486eebe0598568a622.exe
Resource
win10v2004-20220812-en
General
-
Target
cbd23a18f418b6c39d5506cd18cb9440fcf73afbf0b936486eebe0598568a622
-
Size
98KB
-
MD5
44b4895cc4b07a4995a8ef67d857b926
-
SHA1
9a6200d938307562bd16d0ca864a445c36aca6b6
-
SHA256
cbd23a18f418b6c39d5506cd18cb9440fcf73afbf0b936486eebe0598568a622
-
SHA512
619b34b6449973f8d746308582461464e8aa79d3e8160fd8d36b17c0e42f3cde8007bbf93b5a77fb3f9590b1ba7ef6229afa8c863569a3a6bd16809aab82c3c9
-
SSDEEP
3072:pY3jVhSAzXj2cN/GKuxybOvkJvI+ayQFd:KjnXPD9uAKvky9F
Malware Config
Signatures
Files
-
cbd23a18f418b6c39d5506cd18cb9440fcf73afbf0b936486eebe0598568a622.exe windows x86
bee0041a57d30477147876e04e4dbf9d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreateCompatibleDC
GetTextExtentPoint32W
DeleteDC
ddraw
DirectDrawCreate
DirectDrawEnumerateA
DirectDrawCreateEx
kernel32
CreateEventW
GetEnvironmentStringsW
HeapCreate
WriteFile
LCMapStringA
HeapReAlloc
SetUnhandledExceptionFilter
FindNextFileW
VirtualProtect
DeleteCriticalSection
GetProcessHeap
GetModuleHandleA
QueryPerformanceCounter
LocalAlloc
GetModuleFileNameA
GetCommandLineA
FreeEnvironmentStringsA
WideCharToMultiByte
GetStringTypeA
RtlUnwind
TlsSetValue
GetFileType
GetConsoleMode
GetSystemTimeAsFileTime
IsDebuggerPresent
GetProcessVersion
WriteConsoleW
GetVersionExA
FreeEnvironmentStringsW
SetLastError
TerminateProcess
IsProcessorFeaturePresent
InterlockedDecrement
FreeLibrary
SetFilePointer
LeaveCriticalSection
ExitProcess
WriteConsoleA
GetFullPathNameW
VirtualAlloc
InterlockedIncrement
InitializeCriticalSection
GetStringTypeW
GetModuleHandleW
GetConsoleOutputCP
TlsFree
SetEvent
FlushFileBuffers
TlsGetValue
GetCurrentProcess
GetLocaleInfoA
lstrlenW
HeapDestroy
HeapSize
Sleep
UnhandledExceptionFilter
GetLastError
FindClose
LCMapStringW
GetTickCount
GetStdHandle
FindFirstFileW
LoadLibraryA
GetStartupInfoA
TlsAlloc
GetCurrentDirectoryA
CloseHandle
FlushInstructionCache
InterlockedExchange
GetProcAddress
GetConsoleCP
HeapAlloc
MultiByteToWideChar
GetCurrentProcessId
AddAtomW
GetCPInfo
VirtualFree
HeapFree
RaiseException
GetEnvironmentStrings
CreateFileA
SetHandleCount
GetCurrentThreadId
GetOEMCP
GetACP
InterlockedCompareExchange
GetDriveTypeA
SetStdHandle
EnterCriticalSection
ole32
OleInitialize
CoCreateInstance
OleUninitialize
comctl32
InitCommonControlsEx
shell32
SHGetMalloc
SHGetPathFromIDListW
SHBrowseForFolderW
user32
ReleaseDC
GetWindowTextLengthW
SetDlgItemTextW
TranslateMessage
CreateDialogParamW
GetWindowPlacement
GetMessageW
EnableWindow
DestroyWindow
IsDialogMessageW
PostQuitMessage
GetDC
SetFocus
SendMessageW
LoadBitmapW
SetCursor
SetWindowPlacement
PostMessageW
SetWindowLongW
LoadCursorW
RegisterWindowMessageW
UpdateWindow
SetWindowTextW
UnregisterClassA
GetDlgItem
PostThreadMessageW
GetWindow
MessageBoxW
DispatchMessageW
IsWindow
ShowWindow
GetClassNameW
GetWindowTextW
LoadImageW
comdlg32
GetOpenFileNameW
CommDlgExtendedError
Sections
.text Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ