Static task
static1
Behavioral task
behavioral1
Sample
f832940d0af949bd901ae68eca2e727a704e86666acfdc41b81a8c689dc2a355.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f832940d0af949bd901ae68eca2e727a704e86666acfdc41b81a8c689dc2a355.exe
Resource
win10v2004-20220901-en
General
-
Target
f832940d0af949bd901ae68eca2e727a704e86666acfdc41b81a8c689dc2a355
-
Size
870KB
-
MD5
6ea062a651f33cd6b72fd356c72d5aa9
-
SHA1
366c26c2be4ee537e45e873efcdeee80124b4759
-
SHA256
f832940d0af949bd901ae68eca2e727a704e86666acfdc41b81a8c689dc2a355
-
SHA512
cfd80e7debfa776568373736d7b22c5dc549a6a755b22bd40e80b6075e6336236831ef0c0f028cdf351e81adc0482a1a51bca999f4c3602176fb7bbf7b982eb8
-
SSDEEP
12288:/MJ/X/FtYGMZPHaHHzwNraf4DmycU1y3oieOTsJi52BVnKysgTPSnLkMR8ReY9gD:/uP/r+fawFaxfUv82+yLunYMOfgD
Malware Config
Signatures
Files
-
f832940d0af949bd901ae68eca2e727a704e86666acfdc41b81a8c689dc2a355.exe windows x86
dac87f97e6d6fb43d5a2e9b7e08b964f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeviceIoControl
GetCommandLineA
GetModuleFileNameW
HeapCreate
TlsGetValue
CreateFileMappingA
CreateFileA
GetDriveTypeA
GetFileAttributesA
PulseEvent
IsDebuggerPresent
TlsAlloc
DeleteFileA
ReleaseMutex
GetModuleHandleA
lstrlenA
GetStartupInfoA
Sleep
SuspendThread
IsBadStringPtrW
user32
GetWindowLongA
FindWindowW
PeekMessageA
DestroyWindow
DispatchMessageA
GetIconInfo
DispatchMessageA
CallWindowProcW
LoadImageA
IsZoomed
IsWindow
DrawTextW
DestroyMenu
cliconfg
OnInitDialogMain
OnInitDialogMain
OnInitDialogMain
OnInitDialogMain
cryptui
CryptUIDlgCertMgr
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 863KB - Virtual size: 862KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ