Static task
static1
Behavioral task
behavioral1
Sample
08be592d008888a27ca124d50eb294c19f112f72fc31dc8c647cd4be061a4888.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
08be592d008888a27ca124d50eb294c19f112f72fc31dc8c647cd4be061a4888.exe
Resource
win10v2004-20220812-en
General
-
Target
08be592d008888a27ca124d50eb294c19f112f72fc31dc8c647cd4be061a4888
-
Size
208KB
-
MD5
677a4a452228f6a3e1a56a34f9cb4280
-
SHA1
4f66a6868f17a8513f6f675a838a116b5d034351
-
SHA256
08be592d008888a27ca124d50eb294c19f112f72fc31dc8c647cd4be061a4888
-
SHA512
15c76cbad11bb0205c04630ea798012cb3f5af41854455926f9a7370ffb79cdbf7cef110f648ba7843bb74988e93e04566c6cca8fb15358c01b5255af96a12e2
-
SSDEEP
6144:jWY/hTT8ZwWAU2aDaxXBN3XIuHeh+NZ9JmEk:jW8lTkwNU27PNHI2eI9Jmb
Malware Config
Signatures
Files
-
08be592d008888a27ca124d50eb294c19f112f72fc31dc8c647cd4be061a4888.exe windows x86
cf1fd983f97a3f145f59ae544aedc6fa
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
DeviceIoControl
FreeResource
SetLastError
FindResourceA
GetCurrentThreadId
CreateFileA
GetVolumeInformationA
GetSystemTimeAsFileTime
lstrlenA
HeapFree
GetCurrentProcess
SystemTimeToFileTime
CloseHandle
WideCharToMultiByte
MultiByteToWideChar
GetProcessHeap
LoadResource
GetStartupInfoA
LoadLibraryW
HeapAlloc
LockResource
QueryPerformanceCounter
GetCurrentProcessId
GetLocalTime
lstrcmpA
SetUnhandledExceptionFilter
QueryDosDeviceA
lstrcpyA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyW
RegQueryValueExW
RegCloseKey
pautoenr
CertAutoRemove
CertAutoEnrollment
user32
wsprintfA
CharNextA
Sections
.text Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ