Static task
static1
Behavioral task
behavioral1
Sample
11b2062fb66adbd65b40d98662efb1050d297ec00ce52c03528d2aad4f85de6e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
11b2062fb66adbd65b40d98662efb1050d297ec00ce52c03528d2aad4f85de6e.exe
Resource
win10v2004-20220812-en
General
-
Target
11b2062fb66adbd65b40d98662efb1050d297ec00ce52c03528d2aad4f85de6e
-
Size
93KB
-
MD5
11df5b56f028022d7c1a553b0cfecc52
-
SHA1
5d01756ef6350676369306c4e6127e4341bc4d22
-
SHA256
11b2062fb66adbd65b40d98662efb1050d297ec00ce52c03528d2aad4f85de6e
-
SHA512
6abd8e703cb7a463214c40d97a5f876b4a4e4212419de243839642df0ad83392cdcbeeb4070e2645369a4a671ee0931c44193fcda5b6b27830ae2621e15cb61d
-
SSDEEP
1536:l/I4SEoZ0uQdTc7OqErar+sbbbbbbbgeN5HZNSsR2oGi7:9XboZ0uqiOqErarV55qoGi7
Malware Config
Signatures
Files
-
11b2062fb66adbd65b40d98662efb1050d297ec00ce52c03528d2aad4f85de6e.exe windows x86
7b374fbbc30f64eae2c88e5699283a53
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GetComputerNameA
FindResourceW
GetModuleHandleA
lstrlenA
CreateFileW
GetCurrentDirectoryA
CloseHandle
SetLastError
CreateProcessA
LocalFree
HeapCreate
Sleep
lstrcpyA
PulseEvent
UnmapViewOfFile
LoadLibraryW
GetCurrentThreadId
GlobalUnlock
FindClose
user32
CallWindowProcA
SetFocus
DrawEdge
GetDlgItem
DrawMenuBar
FillRect
CreateWindowExA
GetDC
CreateIcon
GetCaretPos
CheckRadioButton
IsWindow
DispatchMessageA
cryptui
CryptUIDlgCertMgr
CryptUIDlgSelectStoreA
WizardFree
LocalEnroll
CryptUIDlgSelectCA
appwiz.cpl
ConfigStartMenu
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 78KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE