Static task
static1
Behavioral task
behavioral1
Sample
82ad5936d27f87b7ef1425dedbf897b685833a39db12fec2aa97edecfa2b07a1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
82ad5936d27f87b7ef1425dedbf897b685833a39db12fec2aa97edecfa2b07a1.exe
Resource
win10v2004-20220901-en
General
-
Target
82ad5936d27f87b7ef1425dedbf897b685833a39db12fec2aa97edecfa2b07a1
-
Size
299KB
-
MD5
7314fdce770447a813c495a846946550
-
SHA1
64a73ad861c0153a11d54d874a7863d42249d860
-
SHA256
82ad5936d27f87b7ef1425dedbf897b685833a39db12fec2aa97edecfa2b07a1
-
SHA512
078f968253a7cd680cf57bdd2c78046d70f3cf3a665a9073ef6fc23296cdb64a8a4bc26cb1604a4af2b260b11795b39c17c44240a1512d6a72a547f9c9af9610
-
SSDEEP
6144:hICWJF2eC24ndfYEXjQzMb29iGH0VpWcHYlfqXU3UYpph4Nd8COX33nn7tM:yFFV4JYEXjQzC0Ti1HYl+UEYB4MDM
Malware Config
Signatures
Files
-
82ad5936d27f87b7ef1425dedbf897b685833a39db12fec2aa97edecfa2b07a1.exe windows x86
d64b0519608e2a1263afb761f8e0bbb4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
GetDiskFreeSpaceA
LocalFree
GetTimeFormatW
UnmapViewOfFile
SetLastError
CreateFileA
Sleep
lstrlenA
GetTickCount
GetComputerNameA
GetCommandLineW
FindVolumeClose
CreateThread
GetSystemTime
ResetEvent
LocalUnlock
GetModuleHandleA
HeapCreate
LoadLibraryW
user32
CheckRadioButton
CallWindowProcA
FillRect
GetDC
DrawEdge
IsWindow
GetDlgItem
GetComboBoxInfo
DrawMenuBar
CreateWindowExA
DispatchMessageA
DrawStateA
SetFocus
cryptui
CryptUIDlgSelectStoreA
LocalEnroll
CryptUIDlgSelectCA
WizardFree
CryptUIDlgCertMgr
hdwwiz.cpl
AddHardwareWizard
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 628KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ