Static task
static1
Behavioral task
behavioral1
Sample
cb31f366198d47e7d61262eb6d58aa7b398fc8098a0b2bfc5a0c2a346b80d34f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cb31f366198d47e7d61262eb6d58aa7b398fc8098a0b2bfc5a0c2a346b80d34f.exe
Resource
win10v2004-20230220-en
General
-
Target
cb31f366198d47e7d61262eb6d58aa7b398fc8098a0b2bfc5a0c2a346b80d34f
-
Size
4.1MB
-
MD5
4b0c5aff1305090dafd0e18c736d0e04
-
SHA1
babccf4bdaad2ee840b30586f709a627703c6b05
-
SHA256
cb31f366198d47e7d61262eb6d58aa7b398fc8098a0b2bfc5a0c2a346b80d34f
-
SHA512
54b8372c64ef3aad73cf313dd67e456eebd0ead2c1d510654d6516990fb295a992d9ff0aeef59bd870276a62aa3fe3a117722458483f21b13e5cdbde9ca6c5e8
-
SSDEEP
98304:fFd48fAnV60QjP3GUuSk+CaWSu+MK9JS+SBdVhuqSk6KcG2NfD:r3v0xou8S+xw6KcGu
Malware Config
Signatures
Files
-
cb31f366198d47e7d61262eb6d58aa7b398fc8098a0b2bfc5a0c2a346b80d34f.exe windows x86
3537fcc338c694f9f29bfe853b919107
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiA
IsDBCSLeadByte
GetNativeSystemInfo
DeleteFileA
SetFileAttributesA
LockResource
LoadResource
SizeofResource
FindResourceA
FindClose
SetLastError
GetFullPathNameA
FindFirstFileA
GetLongPathNameA
FreeLibrary
LoadLibraryExA
GetModuleFileNameA
Sleep
ReadFile
GetFileSize
CloseHandle
CreateFileA
lstrlenA
SetEndOfFile
CreateFileW
WriteConsoleW
SetFilePointer
FlushFileBuffers
SetStdHandle
lstrlenW
LoadLibraryW
GetStringTypeW
LCMapStringW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetConsoleMode
GetConsoleCP
HeapSize
HeapReAlloc
InterlockedIncrement
GetModuleHandleA
GetProcAddress
WideCharToMultiByte
MultiByteToWideChar
InterlockedDecrement
GetCurrentThreadId
GetCurrentProcess
FlushInstructionCache
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
LeaveCriticalSection
EnterCriticalSection
UnhandledExceptionFilter
TerminateProcess
TlsFree
GetModuleFileNameW
GetStdHandle
WriteFile
ExitProcess
IsValidCodePage
GetOEMCP
GetACP
TlsSetValue
TlsGetValue
TlsAlloc
GetCPInfo
IsDebuggerPresent
RaiseException
InterlockedCompareExchange
InterlockedPushEntrySList
HeapFree
GetProcessHeap
HeapAlloc
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
InterlockedPopEntrySList
RtlUnwind
VirtualProtect
GetModuleHandleW
GetSystemInfo
VirtualQuery
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapCreate
SetUnhandledExceptionFilter
user32
SetWindowLongA
CharNextA
DestroyWindow
EndDialog
SendMessageA
GetWindowLongA
CheckDlgButton
ShowWindow
DefWindowProcA
GetActiveWindow
GetSystemMetrics
LoadImageA
EnableWindow
SetForegroundWindow
SetWindowTextA
DialogBoxParamA
GetWindowTextA
GetParent
GetWindowRect
MonitorFromWindow
GetMonitorInfoA
GetClientRect
MapWindowPoints
SetWindowPos
MessageBoxA
GetDlgItem
GetWindow
IsDlgButtonChecked
UnregisterClassA
gdi32
SetTextColor
GetStockObject
SetBkMode
advapi32
RegSetValueExA
GetUserNameA
RegQueryValueExA
RegEnumKeyExA
RegQueryInfoKeyW
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
shell32
SHGetPathFromIDListA
ShellExecuteA
SHBrowseForFolderA
ole32
CoCreateInstance
CoTaskMemFree
CoUninitialize
CoInitialize
CoTaskMemRealloc
CoTaskMemAlloc
oleaut32
VarUI4FromStr
shlwapi
PathFileExistsA
comctl32
InitCommonControlsEx
Sections
.text Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE