Static task
static1
Behavioral task
behavioral1
Sample
4caf10936058b276a1e3c0e491b007dd0069a48a6d795b4c55484783a3d09936.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4caf10936058b276a1e3c0e491b007dd0069a48a6d795b4c55484783a3d09936.exe
Resource
win10v2004-20220812-en
General
-
Target
4caf10936058b276a1e3c0e491b007dd0069a48a6d795b4c55484783a3d09936
-
Size
43KB
-
MD5
36f970eca876ee475b61e30b1b88e3ea
-
SHA1
4ee25fad2131907e9ee42b036eac644dca8d9360
-
SHA256
4caf10936058b276a1e3c0e491b007dd0069a48a6d795b4c55484783a3d09936
-
SHA512
271f0d23c9454079236f492748773c112d5f761161dca28e60e9c5ccb86737de07d79cc895785af1ed461ac4c3486cb0c3cbf776d927022a96dd7e6b8c941235
-
SSDEEP
768:EKdZL8VTJp79KGjWeFP9ZhRpH4Iz8iSB7zyT0pSNkgq8IQOJ:EKbWp75jWW9xpYIoiSt2vkgq8QJ
Malware Config
Signatures
Files
-
4caf10936058b276a1e3c0e491b007dd0069a48a6d795b4c55484783a3d09936.exe windows x86
ff6095555a8afb7011720390792ac72c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
?_query_new_handler@@YAP6AHI@ZXZ
_mbsdec
strftime
_wcstoui64
_wputenv
_ui64tow
rename
_memicmp
_ismbclower
_resetstkoflw
strtok
_lseek
_utime
_lfind
_execvpe
_execlpe
_pgmptr
_fsopen
_CIcosh
_longjmpex
_wunlink
_getmbcp
_outpd
puts
_mbbtype
realloc
_kbhit
msoert2
CchFileTimeToDateTimeSz
strtrimW
PszSkipWhiteW
_MSG
CryptFreeFunc
IsPrint
HrDecodeObject
FIsHTMLFileW
HrSetDirtyFlagImpl
HrGetElementImpl
PszScanToCharA
fGetBrowserUrlEncoding
PszAllocA
MessageBoxInst
HrFillRasCombo
GetExePath
HrGetMsgParam
HrCopyStreamCB
PVDecodeObject
ShellUtil_GetSpecialFolderPath
OpenFileStreamWithFlagsW
PszMonthFromIndex
HrGetBodyElement
StripCRLF
PVGetMsgParam
HrStreamToByte
HrGetStreamPos
UpdateRebarBandColors
RicheditStreamOut
CreateSystemHandleName
HrCreatePhonebookEntry
crypt32
I_CryptInstallOssGlobal
CryptSIPRemoveSignedDataMsg
CryptGetOIDFunctionValue
CryptHashToBeSigned
CertFreeCertificateChain
CertUnregisterPhysicalStore
CryptMsgControl
CryptSignCertificate
CertDuplicateStore
CertNameToStrW
CertCompareIntegerBlob
CryptMsgGetParam
CertGetCTLContextProperty
CryptSIPRemoveProvider
CryptSIPRetrieveSubjectGuidForCatalogFile
CertGetEnhancedKeyUsage
CertFreeCTLContext
CertSetStoreProperty
I_CryptFindLruEntryData
I_CryptGetAsn1Decoder
CryptExportPKCS8
CertOIDToAlgId
CertSerializeCRLStoreElement
CryptVerifyDetachedMessageHash
CertRegisterSystemStore
CryptFindCertificateKeyProvInfo
CryptSIPPutSignedDataMsg
CertStrToNameA
shell32
SHGetMalloc
kernel32
InterlockedIncrement
GetProfileSectionW
DebugActiveProcessStop
SetConsoleOutputCP
GetStartupInfoA
SetProcessShutdownParameters
GetTimeZoneInformation
RegisterWowBaseHandlers
SetConsoleHardwareState
GetUserGeoID
WriteConsoleInputVDMW
VirtualAlloc
WriteConsoleOutputCharacterW
GetStartupInfoW
GetThreadPriority
ExpungeConsoleCommandHistoryA
GlobalMemoryStatusEx
SetVolumeMountPointA
LocalShrink
RestoreLastError
GetProcAddress
ExpandEnvironmentStringsA
GetProcessIoCounters
SetConsoleCP
LZInit
GlobalAlloc
GetModuleHandleW
LoadLibraryA
CreateDirectoryW
RequestWakeupLatency
GetProfileStringA
GetTempPathA
InterlockedPushEntrySList
user32
MessageBoxA
EndDialog
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ