Static task
static1
Behavioral task
behavioral1
Sample
865693bda29fa599c456e10c24d16deebf83a6b17894f8d2f19668b94166b32f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
865693bda29fa599c456e10c24d16deebf83a6b17894f8d2f19668b94166b32f.exe
Resource
win10v2004-20221111-en
General
-
Target
865693bda29fa599c456e10c24d16deebf83a6b17894f8d2f19668b94166b32f
-
Size
44KB
-
MD5
7c3c70263a72dca219905eaa13fb17be
-
SHA1
4756592ef37a2209985e7708a79d69ca430a58b5
-
SHA256
865693bda29fa599c456e10c24d16deebf83a6b17894f8d2f19668b94166b32f
-
SHA512
c87215373e5c68757c713892cd3860ccc8464d0b5d7733c46e4e3cef2db0faa51931a581b7b220c3f72a7b1ddda091d424e34fb14057f1207b97abdc99cfa6f5
-
SSDEEP
768:Wajf3OJMzNp5p3hs0qLVwRO/YAtGxmPPmHnad3u9gDl:Bjf3O4txrq5w+t+6d3vl
Malware Config
Signatures
Files
-
865693bda29fa599c456e10c24d16deebf83a6b17894f8d2f19668b94166b32f.exe windows x86
522d8e4b8d7784d6fa7f4b0296f950da
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceA
LoadLibraryExA
GetProcessHeap
GetEnvironmentVariableA
TlsGetValue
DeleteAtom
ReleaseMutex
SetLastError
GetModuleHandleA
lstrlenW
GetStdHandle
GetCurrentThreadId
GlobalFree
CreateFileA
CloseHandle
GetExitCodeProcess
TlsAlloc
CreateMutexA
HeapCreate
GlobalUnlock
user32
GetDlgItem
GetDC
GetCaretPos
DrawEdge
CallWindowProcA
DrawMenuBar
CreateMenu
CreateWindowExA
IsWindow
CheckRadioButton
FillRect
DispatchMessageA
SetFocus
rsaenh
CPDecrypt
CPDeriveKey
CPHashData
CPSignHash
CPGenKey
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE