Static task
static1
Behavioral task
behavioral1
Sample
be07e71397d3b1da8fe9812c1208a3bfbf4610fdb403ee57e949056669fcebcd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
be07e71397d3b1da8fe9812c1208a3bfbf4610fdb403ee57e949056669fcebcd.exe
Resource
win10v2004-20220812-en
General
-
Target
be07e71397d3b1da8fe9812c1208a3bfbf4610fdb403ee57e949056669fcebcd
-
Size
200KB
-
MD5
0ab8f1709416da9224ff2d9bb6c90857
-
SHA1
11058c73b7c07169d0524b83678b79e5cdddf248
-
SHA256
be07e71397d3b1da8fe9812c1208a3bfbf4610fdb403ee57e949056669fcebcd
-
SHA512
027b88c4f76c2321c0d82ff8ae61cbe0b1ddcb2d2b4895a077b8c4f954c2e0b89e89e38e9ace75b16ed37ee3555f8473927de3593ca0c6b4c0e6fdf7e2c95157
-
SSDEEP
3072:lzZmfnRe3dpYCV/IsWkcIofD2wcQebhqjmI/T0tJpo+vGLzzxDa3vpkQ40nB:lzZWs3YwmywvgpvtJpSzxDahZ
Malware Config
Signatures
Files
-
be07e71397d3b1da8fe9812c1208a3bfbf4610fdb403ee57e949056669fcebcd.exe windows x86
b265969b958d26a2ffd3690d1aa8549b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetVolumeLabelA
GetProcessHeap
SetEndOfFile
RemoveDirectoryA
ExitThread
FindClose
GetFileType
WaitForMultipleObjects
GetModuleHandleA
CreateDirectoryA
HeapCreate
RemoveDirectoryA
CloseHandle
FindAtomA
CreateSemaphoreW
GetCommandLineA
DeleteAtom
ClearCommBreak
WriteFile
GetModuleFileNameA
HeapFree
AddAtomA
IsBadWritePtr
GetDriveTypeW
CreatePipe
cryptui
CryptUIDlgFreeCAContext
CryptUIStartCertMgr
CryptUIWizImport
CryptUIDlgViewContext
DllUnregisterServer
WizardFree
CryptUIWizBuildCTL
DllRegisterServer
CryptUIWizExport
LocalEnroll
CryptUIWizDigitalSign
WizardFree
LocalEnrollNoDS
msvidc32
DriverProc
DriverProc
DriverProc
DriverProc
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 191KB - Virtual size: 191KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE