Static task
static1
Behavioral task
behavioral1
Sample
f3240a72822bdc323abaad54293cc1c487c4c91b8b77449ccb15a3687d45af95.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f3240a72822bdc323abaad54293cc1c487c4c91b8b77449ccb15a3687d45af95.exe
Resource
win10v2004-20220901-en
General
-
Target
f3240a72822bdc323abaad54293cc1c487c4c91b8b77449ccb15a3687d45af95
-
Size
395KB
-
MD5
6aa070347f9b3a69e8c2c877f1f7c4f4
-
SHA1
821d3222343396ac1feb466f046cf20a043774f5
-
SHA256
f3240a72822bdc323abaad54293cc1c487c4c91b8b77449ccb15a3687d45af95
-
SHA512
a47aaae73f8e509f79809112067a30c009b6d08524d6c3102e538652eaaa0dffb6fb0d8061757c994812d49796ecc8ecbff46a3c9cd83def723e9eb8e75335e5
-
SSDEEP
6144:bRRJG8KMBU+xo2e+5bYwCOMeruVipEMS1BWKak/wGY4mswgIxhX8784glfdw:b7U+xa8bAe6V1RUKakIGEz8Tsfd
Malware Config
Signatures
Files
-
f3240a72822bdc323abaad54293cc1c487c4c91b8b77449ccb15a3687d45af95.exe windows x86
44e13c676011cf67b1f29c7da9d9860b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileW
UnmapViewOfFile
lstrlenA
LocalFree
HeapCreate
lstrcpyA
GetComputerNameA
GetSystemTime
GetModuleHandleA
ResetEvent
GlobalUnlock
GetCurrentProcessId
Sleep
FindClose
GetCommandLineW
GetCurrentDirectoryA
CreateThread
CloseHandle
PulseEvent
LoadLibraryW
user32
GetDlgItem
CheckRadioButton
DrawEdge
FillRect
DrawMenuBar
CreateWindowExA
GetCaretPos
DispatchMessageA
CallWindowProcA
SetFocus
IsWindow
GetDC
CreateIcon
cryptui
CryptUIDlgSelectStoreA
CryptUIDlgSelectCA
CryptUIDlgCertMgr
WizardFree
LocalEnroll
appwiz.cpl
ConfigStartMenu
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 396KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 371KB - Virtual size: 372KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ