Static task
static1
Behavioral task
behavioral1
Sample
0c4b9c38f28261584967717f1339c797afcd6de32053956adb20793beb06f2fa.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
0c4b9c38f28261584967717f1339c797afcd6de32053956adb20793beb06f2fa.exe
Resource
win10v2004-20221111-en
General
-
Target
0c4b9c38f28261584967717f1339c797afcd6de32053956adb20793beb06f2fa
-
Size
307KB
-
MD5
218b5e897734b816e0ab438ae288690b
-
SHA1
d60392ce9545fc45d26ef0a1083491cea2b9284c
-
SHA256
0c4b9c38f28261584967717f1339c797afcd6de32053956adb20793beb06f2fa
-
SHA512
fb7f4f71ea7525da276d2a347bd041584766360dee2e69e68540fd1efcac8d9847eaf3a7e0c1c7749e0cd05e2aecb5eb48e7fce7fcda7edea951c932e1139294
-
SSDEEP
6144:yyzcPwFaugMpNcWBQgfNsghZMcqHbVNO6gn4CRBjBeuwgyo3XBCM8Flh2sTN:PzowFauSWvbZMcMbvO6QPB0ufxCdFSs5
Malware Config
Signatures
Files
-
0c4b9c38f28261584967717f1339c797afcd6de32053956adb20793beb06f2fa.exe windows x86
ac6b2ec26351a92fdeb3d36c9a0610de
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesW
GetDiskFreeSpaceW
CreateFileA
GetCommandLineA
HeapCreate
LocalFree
GetTickCount
lstrcmpA
GetDriveTypeA
LoadLibraryA
GetSystemTime
SetEvent
LoadLibraryA
CreateThread
ReleaseMutex
FindAtomA
CloseHandle
GetComputerNameA
SetLastError
ReleaseMutex
user32
FillRect
DestroyCaret
GetClipCursor
GetDlgItem
SetFocus
GetClassInfoA
DispatchMessageA
GetComboBoxInfo
CloseWindow
DrawStateA
CallWindowProcA
GetKeyState
CreateWindowExA
cryptdll
CDLocateRng
CDLocateCheckSum
MD5Init
MD5Final
CDBuildVect
desk.cpl
DisplaySaveSettings
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 348KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ