Static task
static1
Behavioral task
behavioral1
Sample
5d7b8770ebb3c44a2bbb3d12dfb6a1f82d0e0b0302469cf0f3e933799cef32a6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5d7b8770ebb3c44a2bbb3d12dfb6a1f82d0e0b0302469cf0f3e933799cef32a6.exe
Resource
win10v2004-20220812-en
General
-
Target
5d7b8770ebb3c44a2bbb3d12dfb6a1f82d0e0b0302469cf0f3e933799cef32a6
-
Size
307KB
-
MD5
30c1a69851ea78cda79c00c0003d5c74
-
SHA1
4d156258a5d6f9473f9616967b7607a8d5d5f154
-
SHA256
5d7b8770ebb3c44a2bbb3d12dfb6a1f82d0e0b0302469cf0f3e933799cef32a6
-
SHA512
ceb577c504e1608573306e39086b27b809f3dac9db6475ffe5a5b195e29d0d7b18b357b1d5d4e5b6dbd56290a742c183a29db0031038549092c206793558c2e7
-
SSDEEP
6144:PTdXZJM8yWnw+GKhFjWsTJ57k0wLaadTJ2JSAUDpDKPycNtC0ULW21+6Z6+:7dXZW8yWw+GEjWsJ5otaa32JSAUDpuDk
Malware Config
Signatures
Files
-
5d7b8770ebb3c44a2bbb3d12dfb6a1f82d0e0b0302469cf0f3e933799cef32a6.exe windows x86
229c45cbb1467615f5a130084dae77f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetDiskFreeSpaceW
ReleaseMutex
GetModuleHandleA
ResetEvent
GetFileAttributesW
LoadLibraryW
CreateThread
SetEvent
CloseHandle
GetComputerNameA
GetCommandLineW
LocalFree
ResumeThread
GetTickCount
HeapCreate
FindAtomW
lstrcmpiW
SetLastError
GetSystemTime
user32
GetKeyState
SetFocus
GetClassInfoA
FillRect
GetComboBoxInfo
GetDlgItem
CallWindowProcA
CloseWindow
GetClipCursor
DestroyCaret
CreateWindowExA
DrawStateA
DispatchMessageA
MessageBoxA
cryptdlg
CertTrustInit
CertTrustCertPolicy
CertConfigureTrustA
CertTrustFinalPolicy
DecodeRecipientID
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 344KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 294KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ