Static task
static1
Behavioral task
behavioral1
Sample
d50f4b27061d0927ba21fddc359158c9b41c68e4ab3747ea0aa2176bd3af323f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d50f4b27061d0927ba21fddc359158c9b41c68e4ab3747ea0aa2176bd3af323f.exe
Resource
win10v2004-20220812-en
General
-
Target
d50f4b27061d0927ba21fddc359158c9b41c68e4ab3747ea0aa2176bd3af323f
-
Size
299KB
-
MD5
50b2922418ff2ad5331f1d518ada5e30
-
SHA1
9046252a6f5ca7e048e4fae80c0868c243c138a5
-
SHA256
d50f4b27061d0927ba21fddc359158c9b41c68e4ab3747ea0aa2176bd3af323f
-
SHA512
b1eb50028db77437b3a21653f1fc1a0c68e72b2ccaa3eae0b65fb58d89b44bcd241dceeddd93d2ba81190867027a9d293ff1edf33595187adbdf70a9c07b5630
-
SSDEEP
6144:CXrGWzPdLRRZSxIvkI+igOrHYCNMf5G1bqMmAHXW6WIi2:oTPdF//9rHYCN+Ob3mAHXW
Malware Config
Signatures
Files
-
d50f4b27061d0927ba21fddc359158c9b41c68e4ab3747ea0aa2176bd3af323f.exe windows x86
623c72eb219c4775f5bb567591fa71e9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEvent
CreateFileA
LocalUnlock
LoadLibraryExW
CloseHandle
CreateThread
GetTimeFormatA
GetModuleHandleA
GetTickCount
UnmapViewOfFile
FindVolumeClose
GetSystemTime
Sleep
HeapCreate
GetComputerNameA
GetCurrentDirectoryA
GetCommandLineW
SetLastError
LocalFree
lstrlenA
user32
FillRect
DispatchMessageA
SetFocus
IsWindow
GetDC
CallWindowProcA
GetKeyState
CheckRadioButton
DrawEdge
GetDlgItem
DrawMenuBar
GetComboBoxInfo
CreateWindowExA
cryptui
WizardFree
CryptUIDlgSelectStoreA
CryptUIDlgCertMgr
CryptUIDlgSelectCA
LocalEnroll
inetcpl.cpl
OpenFontsDialog
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 628KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ