Static task
static1
Behavioral task
behavioral1
Sample
PyCryWare_OB.exe
Resource
win10-20220812-ja
General
-
Target
PyCryWare_OB.exe
-
Size
465KB
-
MD5
f83b6b542452751e1bcfbbda1e536eed
-
SHA1
c5a8f1b090caa8fc582c4acb6ea703a099fe393f
-
SHA256
aba5b663e55763ac65ebca58078bf33eaf56e02c6d0ba7f11873b751e2a3541a
-
SHA512
5721a010e76fb47790d27525236de14f03cd948abc194d351b216ee434f2cf82b3c67656338232aac36a3c1b3cc59c106776e2c74f5eb06cf8c525bd970eab0a
-
SSDEEP
6144:wrLAv0ua+/LNscnb/nYiwPT8c8fLud+3GATvJ4j/HXZoMc9KyU6JG9yCrrci5:4n4Nsn7odzCQs3kfHs9Q8
Malware Config
Signatures
Files
-
PyCryWare_OB.exe.exe windows x86
b38c4706edbe23ba00098a1e4a35f6ba
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
LoadLibraryA
CloseHandle
DeleteFileA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
WriteFile
ReadFile
CreateFileA
lstrlenA
GetTempFileNameA
GetTempPathA
lstrcmpA
GetProcAddress
GetConsoleTitleA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
user32
SetForegroundWindow
GetWindowThreadProcessId
DispatchMessageA
TranslateMessage
PeekMessageA
MessageBoxA
EnumWindows
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 362B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 764B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 226B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ