Static task
static1
Behavioral task
behavioral1
Sample
df24b1ea318b5b4519ee284ebe3f283ad418e8df25d9a3dc1793533ad2584a8b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
df24b1ea318b5b4519ee284ebe3f283ad418e8df25d9a3dc1793533ad2584a8b.exe
Resource
win10v2004-20220901-en
General
-
Target
df24b1ea318b5b4519ee284ebe3f283ad418e8df25d9a3dc1793533ad2584a8b
-
Size
107KB
-
MD5
39e2543cb8e9987ae4af7b18255139e0
-
SHA1
24856bd8f4d54e9564b63a693d491e9b7b7140ea
-
SHA256
df24b1ea318b5b4519ee284ebe3f283ad418e8df25d9a3dc1793533ad2584a8b
-
SHA512
892873c3426fbd1256bac320a1653103db22e48c213c36fe2a2b63c4d1dcdc2c3d271b088336b8642216b2cfccc8985099fb152ba006cb4f5336301933cfc535
-
SSDEEP
1536:ftE1Zz9OSsa06JlAPp9CNk72iZ5/ITnmEcZNaalpojZ23NvXMAK6w6Ebcx0:fa1Z+CJWR9CJijwlcLujZMNvX5rDWy0
Malware Config
Signatures
Files
-
df24b1ea318b5b4519ee284ebe3f283ad418e8df25d9a3dc1793533ad2584a8b.exe windows x86
834ad9e7ff2034233ef1cfb4f31d5598
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalUnlock
FindClose
UnmapViewOfFile
GetCurrentDirectoryA
GetModuleHandleA
CreateFileW
SetLastError
GetCurrentThreadId
CreateProcessA
CloseHandle
FindResourceW
lstrlenA
GetCommandLineA
lstrcpyA
LocalFree
GetComputerNameA
HeapCreate
Sleep
PulseEvent
LoadLibraryExW
user32
SetFocus
CreateWindowExA
DrawEdge
GetDlgItem
CreateIcon
CheckRadioButton
DispatchMessageA
DrawMenuBar
GetCaretPos
GetDC
CallWindowProcA
IsWindow
FillRect
rsaenh
CPHashData
CPSignHash
CPDecrypt
CPDeriveKey
CPGenKey
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 92KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ouxxevw Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE