Static task
static1
Behavioral task
behavioral1
Sample
54e202d634f03416e4529de4039cd664dbbfdd86112a037f97bab8805b2ad02b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
54e202d634f03416e4529de4039cd664dbbfdd86112a037f97bab8805b2ad02b.exe
Resource
win10v2004-20220812-en
General
-
Target
54e202d634f03416e4529de4039cd664dbbfdd86112a037f97bab8805b2ad02b
-
Size
299KB
-
MD5
9e9e24ed1d69008b49f878cd1d8cce37
-
SHA1
ad8893c37545815c6be17709741fd7e85c6ab107
-
SHA256
54e202d634f03416e4529de4039cd664dbbfdd86112a037f97bab8805b2ad02b
-
SHA512
c4b3083ddf29eb8901d0fdadf5b4fac88d395d30da535e604eb2dcfda51ddc781562b6a7100dc2411ba76b8c0cea2c8f93f1d4f307b5a32c0e9404b6cf29360a
-
SSDEEP
6144:h12nVuYHbO9O+j2b9FZQf+jGMBVdw7g6xfQXSyXgzW:hsnVuYHbsOsGfZu+6MBwg6yDgz
Malware Config
Signatures
Files
-
54e202d634f03416e4529de4039cd664dbbfdd86112a037f97bab8805b2ad02b.exe windows x86
6bfcfeb43c119dbf635aaed25d65816d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
GetSystemTime
CreateFileA
SetLastError
GetComputerNameA
GetCommandLineW
lstrlenA
GetModuleHandleA
LoadLibraryExW
GetTimeFormatA
HeapCreate
FindVolumeClose
SetEvent
Sleep
CloseHandle
LocalUnlock
UnmapViewOfFile
GetCurrentDirectoryA
LocalFree
CreateThread
user32
IsWindow
CreateWindowExA
DrawEdge
GetDlgItem
GetComboBoxInfo
GetDC
DispatchMessageA
CallWindowProcA
GetKeyState
CheckRadioButton
SetFocus
FillRect
DrawMenuBar
cryptui
LocalEnroll
CryptUIDlgSelectStoreA
CryptUIDlgCertMgr
WizardFree
CryptUIDlgSelectCA
inetcpl.cpl
OpenFontsDialog
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 628KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ