Static task
static1
Behavioral task
behavioral1
Sample
87ad9a3d8c0b4abac3f6525a16a15e870115773e6e962bc6d86b9cb0ff84bb64.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
87ad9a3d8c0b4abac3f6525a16a15e870115773e6e962bc6d86b9cb0ff84bb64.exe
Resource
win10v2004-20220812-en
General
-
Target
87ad9a3d8c0b4abac3f6525a16a15e870115773e6e962bc6d86b9cb0ff84bb64
-
Size
870KB
-
MD5
100e90dbc6fcefee7d87291cd63eaa10
-
SHA1
c5ccbe851f6def27cc053d3ab360c8214afd0cf0
-
SHA256
87ad9a3d8c0b4abac3f6525a16a15e870115773e6e962bc6d86b9cb0ff84bb64
-
SHA512
b8a3cfadd23ea79d4ed1a2c12a4289f7429196a86ca08224671bc28313cb8b6af8c1dbb34b186b1aa567e61029ce3e903629d790ac76449e1cf572cb3912eea8
-
SSDEEP
12288:ywdhkk+9FdK+uSQ/WhnZG8o2cI01u02zF7Z2copAEzY/ERUxvAN3:FF0FpQ/Whn9o2lCPp9p1zYsRH
Malware Config
Signatures
Files
-
87ad9a3d8c0b4abac3f6525a16a15e870115773e6e962bc6d86b9cb0ff84bb64.exe windows x86
1cebfa5e3ee25339b77a1d1f2dac948e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
GetModuleHandleA
TlsAlloc
GetDriveTypeA
GetFileAttributesA
GetStartupInfoA
DeviceIoControl
GetModuleFileNameW
TlsGetValue
Sleep
PulseEvent
IsDebuggerPresent
IsBadStringPtrA
CreateFileA
HeapCreate
CreateFileMappingA
DeleteFileA
SuspendThread
lstrlenA
GetACP
user32
DispatchMessageA
GetIconInfo
DestroyWindow
LoadImageA
IsWindow
CallWindowProcW
DispatchMessageA
DrawTextW
FindWindowW
PeekMessageA
DestroyMenu
IsZoomed
GetWindowLongA
asycfilt
FilterCreateInstance
FilterCreateInstance
FilterCreateInstance
FilterCreateInstance
cryptui
WizardFree
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 863KB - Virtual size: 862KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ