Static task
static1
Behavioral task
behavioral1
Sample
c1d44544bcb46ea18f5a512ebd9138b635f3cf8dd1f16ec4490972e090a53034.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c1d44544bcb46ea18f5a512ebd9138b635f3cf8dd1f16ec4490972e090a53034.exe
Resource
win10v2004-20220812-en
General
-
Target
c1d44544bcb46ea18f5a512ebd9138b635f3cf8dd1f16ec4490972e090a53034
-
Size
870KB
-
MD5
846c3e5a884f55b48f8c196f3f935169
-
SHA1
f684e8efa0a9383a1c239c9db747ad085f062c6e
-
SHA256
c1d44544bcb46ea18f5a512ebd9138b635f3cf8dd1f16ec4490972e090a53034
-
SHA512
0b8f0f08cf94fed161ca921b83623246b778584cbcc07aac82177f71e4413186dc44dab2d185f724dc8cfeafb30dff95d4b111c387e91f44039e7951acb0c4d9
-
SSDEEP
12288:OmWht/kW70u/U2DwhYQRQvk+XGmJF2OVXRVKpRCQ7DBvz5Qxty:Aww/ZD+ANXGmJFrXRVCp3Bvz51
Malware Config
Signatures
Files
-
c1d44544bcb46ea18f5a512ebd9138b635f3cf8dd1f16ec4490972e090a53034.exe windows x86
33607cd59b870015b1e6a4b2ef0a5847
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
IsDebuggerPresent
GetDriveTypeA
TlsAlloc
PulseEvent
DeleteFileA
HeapCreate
GetFileAttributesA
ReleaseMutex
GetModuleHandleA
CreateFileMappingA
SuspendThread
GetCommandLineA
CreateFileA
DeviceIoControl
GetStartupInfoA
IsBadStringPtrW
GetModuleFileNameW
Sleep
TlsGetValue
user32
LoadImageA
DispatchMessageA
DrawTextW
DispatchMessageA
FindWindowW
CallWindowProcW
DestroyMenu
DestroyWindow
GetIconInfo
GetWindowLongA
IsWindow
IsZoomed
PeekMessageA
cliconfg
OnInitDialogMain
OnInitDialogMain
OnInitDialogMain
OnInitDialogMain
cryptui
CryptUIDlgCertMgr
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 863KB - Virtual size: 862KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ