Static task
static1
Behavioral task
behavioral1
Sample
0c8da121cdf7d3ba84c7b333e685e8ecc3c815f3b4ee56aaab6c08b297d320ee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0c8da121cdf7d3ba84c7b333e685e8ecc3c815f3b4ee56aaab6c08b297d320ee.exe
Resource
win10v2004-20220812-en
General
-
Target
0c8da121cdf7d3ba84c7b333e685e8ecc3c815f3b4ee56aaab6c08b297d320ee
-
Size
86KB
-
MD5
086cd63ae595e8f10e9fa6cc73ecc152
-
SHA1
aadf00e522c34f43c1e405ff8728c32dd9e64a09
-
SHA256
0c8da121cdf7d3ba84c7b333e685e8ecc3c815f3b4ee56aaab6c08b297d320ee
-
SHA512
9347003aff1de174e6f272de8790735a7ab6a127c61a6bbe4eb1d4cd3135ac33e84d6ea009b8d4f8f0efa6b9b934ce22c92fd16d55aad1d529bc9f90acf06cbc
-
SSDEEP
1536:b9s40MgQzfWrrDNhLGrI2hhhKEEEEEEE0EEEEsc8WrXS:hr0Kzq5hLtEEEEEEE0EEEEUMi
Malware Config
Signatures
Files
-
0c8da121cdf7d3ba84c7b333e685e8ecc3c815f3b4ee56aaab6c08b297d320ee.exe windows x86
a1a1ac694cda23f1f1edf2b96521293f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
GetComputerNameA
lstrcpyA
CreateFileW
PulseEvent
LocalFree
FindResourceW
lstrlenA
LoadLibraryW
SetLastError
GetCommandLineA
HeapCreate
GetCurrentDirectoryA
CreateProcessA
Sleep
UnmapViewOfFile
CloseHandle
GetCurrentThreadId
GlobalUnlock
GetModuleHandleA
user32
DrawMenuBar
GetDC
DispatchMessageA
CallWindowProcA
CreateIcon
SetFocus
GetCaretPos
FillRect
IsWindow
CreateWindowExA
DrawEdge
CheckRadioButton
GetDlgItem
cryptui
CryptUIDlgCertMgr
CryptUIDlgSelectCA
WizardFree
CryptUIDlgSelectStoreA
LocalEnroll
appwiz.cpl
ConfigStartMenu
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 71KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE