Static task
static1
Behavioral task
behavioral1
Sample
15bdf36b12f45239483308ec09341d144b6187e2220f26f56d8c096fd6145bae.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
15bdf36b12f45239483308ec09341d144b6187e2220f26f56d8c096fd6145bae.exe
Resource
win10v2004-20220901-en
General
-
Target
15bdf36b12f45239483308ec09341d144b6187e2220f26f56d8c096fd6145bae
-
Size
65KB
-
MD5
007fbe6d30dc50aec21b4af5750a22a3
-
SHA1
9deab443fb93b78ca65b937a2ec7d1532452bf4b
-
SHA256
15bdf36b12f45239483308ec09341d144b6187e2220f26f56d8c096fd6145bae
-
SHA512
b075e2c1b37fda40a36b39173d22fd3655cd732a731f7ce0c6f1f6fceb8ea47d64de415aa7e509446dcaaf1bc3b604c1c7f95ab62ed9d31f48ca0b6143d78779
-
SSDEEP
768:stEoZh/TswD8sU5vLMu7PAiRKZ20u1tgffoE6rHmOaU8agaP6DyanzOGnR:stEoX9D8sMMOPAoKu/aforfazagfyaHR
Malware Config
Signatures
Files
-
15bdf36b12f45239483308ec09341d144b6187e2220f26f56d8c096fd6145bae.exe windows x86
f3d24f7988d5c5ad6a1021144823874a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpyA
FindResourceW
SetLastError
GlobalUnlock
HeapCreate
LoadLibraryExW
UnmapViewOfFile
GetCurrentThreadId
FindClose
CloseHandle
lstrlenA
GetCurrentDirectoryA
CreateFileW
PulseEvent
Sleep
GetCommandLineA
GetComputerNameA
LocalFree
CreateProcessA
GetModuleHandleA
user32
FillRect
SetFocus
CallWindowProcA
DrawMenuBar
DrawEdge
GetCaretPos
CheckRadioButton
GetDlgItem
GetDC
IsWindow
DispatchMessageA
CreateIcon
CreateWindowExA
rsaenh
CPGenKey
CPHashData
CPDecrypt
CPDeriveKey
CPSignHash
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 50KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE