Static task
static1
Behavioral task
behavioral1
Sample
c82ff2089e7e9f70283f58658c9cadef9fa08917b4b329f804ae65d4ddb481e3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c82ff2089e7e9f70283f58658c9cadef9fa08917b4b329f804ae65d4ddb481e3.exe
Resource
win10v2004-20220812-en
General
-
Target
c82ff2089e7e9f70283f58658c9cadef9fa08917b4b329f804ae65d4ddb481e3
-
Size
784KB
-
MD5
6e468cfed73ba52eb0b1a4e0040a6e3b
-
SHA1
9713dddb16ea7dd5f9233d1b9b5eb78b1b6da1cb
-
SHA256
c82ff2089e7e9f70283f58658c9cadef9fa08917b4b329f804ae65d4ddb481e3
-
SHA512
a020037db4e2ddf7df60444a11dcb2a419e94329aa62797225e84a57519785fe90ea1c6516eadfe3152deb5caa070b775982116b5e5cfcd7e47ca347e1d3721f
-
SSDEEP
12288:zRM0rmk0LPQRUdENxbRN0w2MK2rGMP/VybDkxu9HGh1mBYBXaABPptjZBP/WGBe:zRM0rmfzaUXwhw4GUkYkA5ptjZBP2
Malware Config
Signatures
Files
-
c82ff2089e7e9f70283f58658c9cadef9fa08917b4b329f804ae65d4ddb481e3.exe windows x86
e81f0d673dbac0f31a2927d63541053b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenW
CreateEventW
IsBadStringPtrW
GetCurrentThreadId
GetPrivateProfileStringA
TlsGetValue
CloseHandle
HeapCreate
LocalFree
InitializeCriticalSection
LoadLibraryW
WriteFile
FindClose
GetFileTime
GlobalFlags
GetDriveTypeA
GetCurrentProcessId
ReleaseMutex
ReleaseMutex
GetEnvironmentVariableW
user32
GetKeyboardType
CreateWindowExA
IsWindow
GetClientRect
DrawStateW
EndDialog
GetSysColor
SetFocus
DrawTextA
CallWindowProcW
DispatchMessageA
GetSysColor
GetClassInfoA
pnrpnsp
NSPStartup
NSPStartup
NSPStartup
NSPStartup
NSPStartup
advapi32
InitializeSid
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 774KB - Virtual size: 773KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ