Static task
static1
Behavioral task
behavioral1
Sample
7827dcaa22a64f57d78529db0976b22c2b735f5503de7abb98ce218548ca4901.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7827dcaa22a64f57d78529db0976b22c2b735f5503de7abb98ce218548ca4901.exe
Resource
win10v2004-20221111-en
General
-
Target
7827dcaa22a64f57d78529db0976b22c2b735f5503de7abb98ce218548ca4901
-
Size
124KB
-
MD5
8cc5f98aa75ce2c7ecb2e0c5e9ac9ae4
-
SHA1
e0af480aa1658aefa628d6c3ebcd18dff9a9d3fb
-
SHA256
7827dcaa22a64f57d78529db0976b22c2b735f5503de7abb98ce218548ca4901
-
SHA512
8149b1f69148749cc5b514d048e4b53b754d7670389a3d1e94dfdf061c0c35ba00b31e6e4db63d47ab5873c43fb26b0a1484b1317f5fecb7005033519a7081bf
-
SSDEEP
3072:HpAFura95onh8GGrw4BUhCEpzjG7J1yP8:JYXohh+kGFc0
Malware Config
Signatures
Files
-
7827dcaa22a64f57d78529db0976b22c2b735f5503de7abb98ce218548ca4901.exe windows x86
6c81bc1f44a35b1320cd872ff03ea39f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rsaenh
CPGenKey
CPDeriveKey
user32
PostMessageW
GetClassInfoA
LoadStringA
MessageBoxW
wsprintfA
DrawEdge
DialogBoxParamW
DispatchMessageW
FindWindowExA
IsCharUpperA
GetKeyNameTextA
kernel32
GetStartupInfoW
GetLogicalDriveStringsA
CreateWaitableTimerW
GetLocalTime
CreateEventA
WaitForSingleObject
GetFileSize
TlsGetValue
GetProcAddress
LoadLibraryA
FindFirstFileA
GetEnvironmentVariableA
GetSystemTime
SetEnvironmentVariableA
GetLastError
CreateSemaphoreW
uxtheme
GetThemeTextMetrics
GetThemeFont
CloseThemeData
GetThemeInt
SetWindowTheme
DrawThemeEdge
GetThemeSysSize
OpenThemeData
GetThemeTextExtent
GetThemeBool
Sections
.text Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ