Static task
static1
Behavioral task
behavioral1
Sample
c0bd6de14f8c94e12634437610f4426f5e69d98861d23a3eab37016607e0234b.exe
Resource
win10v2004-20221111-en
General
-
Target
c0bd6de14f8c94e12634437610f4426f5e69d98861d23a3eab37016607e0234b
-
Size
72KB
-
MD5
3cd424758c14e6b04e4c5e7db78b7a25
-
SHA1
38693ee95e93336061c35d8f9f541d755ed21bf3
-
SHA256
c0bd6de14f8c94e12634437610f4426f5e69d98861d23a3eab37016607e0234b
-
SHA512
e66295db3792f872e289aa192291eb64c624be034fd977ede71890f96c16c090becbdaf4e683b1eb1d61f832f53a25869f93369846f463fa419b1b1eb9b58bc3
-
SSDEEP
1536:3vAkGoo+bH/J027ZKxyafwhHCC/mq1ktG:3vuWbaRgaYtX1ktG
Malware Config
Signatures
Files
-
c0bd6de14f8c94e12634437610f4426f5e69d98861d23a3eab37016607e0234b.exe windows x86
78347e8ca7a80658201c5366a8b9706e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
GetModuleFileNameW
GetProcAddress
LoadLibraryA
LCMapStringW
LCMapStringA
GetLastError
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
LocalFree
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
RtlUnwind
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
Sleep
HeapSize
InitializeCriticalSection
GetCPInfo
GetACP
GetOEMCP
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
oleaut32
SysFreeString
VariantInit
VariantCopy
VariantClear
SysAllocString
GetErrorInfo
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE