Static task
static1
Behavioral task
behavioral1
Sample
2385b01be095ea4e9833ca757f14b3c6209c65bd6284a7eb346ec571d247bce6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2385b01be095ea4e9833ca757f14b3c6209c65bd6284a7eb346ec571d247bce6.exe
Resource
win10v2004-20220812-en
General
-
Target
2385b01be095ea4e9833ca757f14b3c6209c65bd6284a7eb346ec571d247bce6
-
Size
41KB
-
MD5
7b8cc6154616e3d08beee3ac7e387a72
-
SHA1
062e95749dece5cd0d12d542ae2f93d0c7a6ff06
-
SHA256
2385b01be095ea4e9833ca757f14b3c6209c65bd6284a7eb346ec571d247bce6
-
SHA512
b0b3a51f71cca6ad719f073f2ea24c3e44ed22c7d9272869a0829ed9e63705dd29780b27a8ce14038ef7635562de15dc900478d04cbdcd298b7a23c75ddd82a5
-
SSDEEP
768:/uc0IXllAEyYzFUwL1H6nYJmXeXXdLvvnQgA:Wc0IXEzY3xb+bD
Malware Config
Signatures
Files
-
2385b01be095ea4e9833ca757f14b3c6209c65bd6284a7eb346ec571d247bce6.exe windows x86
e64cb7a696671586da57182844c0fa55
Code Sign
3b:e9:61:81:65:62:d8:8a:47:aa:70:38:9f:4a:08:b1Certificate
IssuerCN=WaaqiqNot Before31/12/2010, 22:00Not After31/12/2039, 23:59SubjectCN=Waaqiq06:6b:28:75:11:b5:1a:37:a3:de:14:d1:19:88:b3:8e:b2:4d:89:e6Signer
Actual PE Digest06:6b:28:75:11:b5:1a:37:a3:de:14:d1:19:88:b3:8e:b2:4d:89:e6Digest Algorithmsha1PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=Waaqiq29/09/2022, 18:54 Valid: false
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
FindWindowA
kernel32
GetVersion
ExitProcess
GetModuleHandleA
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 196B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 216B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 214B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ