Static task
static1
Behavioral task
behavioral1
Sample
4d64ee013e7e4ad09aa80d482c18bb2b9010066bc78a61167334103883895f5e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4d64ee013e7e4ad09aa80d482c18bb2b9010066bc78a61167334103883895f5e.exe
Resource
win10v2004-20220812-en
General
-
Target
4d64ee013e7e4ad09aa80d482c18bb2b9010066bc78a61167334103883895f5e
-
Size
305KB
-
MD5
a2eb2d13d0dca28fd13db69d3adbf770
-
SHA1
6227218ff8f0ad3b164a00cfddd2e31efea6de98
-
SHA256
4d64ee013e7e4ad09aa80d482c18bb2b9010066bc78a61167334103883895f5e
-
SHA512
cfffd8afb55b786a67ff886177a86541267a854d97999fd699504d2659f29d3636eca4ca6b3c865c0aee9aecd642d9243e7996ddd5b9cbf3c0a199a71f2b00ef
-
SSDEEP
6144:0rruZnR45U9/yrbyc92UIwQ7OXw1NA4QM70xkjWoX8v2lMuZvT:0rrCnRRJ228ITxQ00c1X8sMuZvT
Malware Config
Signatures
Files
-
4d64ee013e7e4ad09aa80d482c18bb2b9010066bc78a61167334103883895f5e.exe windows x86
090986f12185fdd98d95a1eee5252c66
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenW
FindClose
ReleaseMutex
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeA
IsBadStringPtrW
FindAtomA
WriteFile
LoadLibraryW
HeapCreate
InitializeCriticalSection
GetFileTime
TlsGetValue
LocalFree
ReleaseMutex
GetEnvironmentVariableW
GetPrivateProfileStringA
GlobalFlags
CreateEventW
user32
GetSysColor
CreateWindowExA
DrawTextA
GetClassInfoA
GetKeyboardType
IsWindow
CallWindowProcW
SetFocus
DispatchMessageA
GetSysColor
EndDialog
GetClientRect
DrawStateW
rastapi
DeviceDone
DeviceDone
DeviceDone
DeviceDone
DeviceDone
cryptui
LocalEnroll
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ