Static task
static1
Behavioral task
behavioral1
Sample
a105cc360f95299a3ed46d39b869494109711c158306967e8f0045f35a8a3acd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a105cc360f95299a3ed46d39b869494109711c158306967e8f0045f35a8a3acd.exe
Resource
win10v2004-20220812-en
General
-
Target
a105cc360f95299a3ed46d39b869494109711c158306967e8f0045f35a8a3acd
-
Size
200KB
-
MD5
0cdcb06c6a5c22e19b4d6668c3e0bb93
-
SHA1
a1a57473486527623070788cef14351a0764ba11
-
SHA256
a105cc360f95299a3ed46d39b869494109711c158306967e8f0045f35a8a3acd
-
SHA512
7d781113f6ad6932e14b889c85a38d21ce332985d43325d9f3061ab0ac551ea00f71c0da402c637ccbaba896e3f136ac2dad049f4a1c19e505dd25df5e81c56b
-
SSDEEP
3072:ymfnRe3dpYCV/IsWkcIofD2wcQebhqjmI/T0tJpo+vGLzzxDa3vpkQ40n3:yWs3YwmywvgpvtJpSzxDahv
Malware Config
Signatures
Files
-
a105cc360f95299a3ed46d39b869494109711c158306967e8f0045f35a8a3acd.exe windows x86
a06790da567fc2e75e37a38bad0c052c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryA
WaitForMultipleObjects
RemoveDirectoryA
CloseHandle
CreatePipe
GetModuleFileNameA
ClearCommBreak
SetEndOfFile
WriteFile
GetModuleHandleA
FindClose
GetFileType
DeleteAtom
CreateSemaphoreW
HeapCreate
GetDriveTypeW
GetCommandLineA
FindAtomA
SetVolumeLabelA
HeapFree
ExitThread
CreateDirectoryA
IsBadWritePtr
AddAtomA
GetProcessHeap
cryptui
CryptUIWizImport
LocalEnroll
CryptUIWizBuildCTL
WizardFree
CryptUIWizDigitalSign
DllUnregisterServer
DllRegisterServer
WizardFree
LocalEnrollNoDS
CryptUIDlgViewContext
CryptUIStartCertMgr
CryptUIWizExport
CryptUIDlgFreeCAContext
msvidc32
DriverProc
DriverProc
DriverProc
DriverProc
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 191KB - Virtual size: 191KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE