Static task
static1
Behavioral task
behavioral1
Sample
828611e55a476776b4fae368755683f85496e616c0638c5f9910e0e0bb02709b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
828611e55a476776b4fae368755683f85496e616c0638c5f9910e0e0bb02709b.exe
Resource
win10v2004-20221111-en
General
-
Target
828611e55a476776b4fae368755683f85496e616c0638c5f9910e0e0bb02709b
-
Size
416KB
-
MD5
f9b56cf7ed75a2d0203111a04fccf202
-
SHA1
fd2fd8c4a9e52e35be33d7b05bb046a561143083
-
SHA256
828611e55a476776b4fae368755683f85496e616c0638c5f9910e0e0bb02709b
-
SHA512
19a72d0e0cca2cfce6f82b13bb77798ab619acda9513a6d6588a3669909eab94f57fb4e3e75527a8c5a6faa532b07e1e1a3082ff9fd7c48e3ed9949052fd47cb
-
SSDEEP
12288:gnUm8bh/yvkNkVhkkuK2Qtm98oQ8wUDXVzwl:OMQvCkPz2EG8opHlw
Malware Config
Signatures
Files
-
828611e55a476776b4fae368755683f85496e616c0638c5f9910e0e0bb02709b.exe windows x86
acffb7bce4693b733e40915126e8ae27
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
lstrcpynA
GetComputerNameW
GetDiskFreeSpaceW
SetEvent
GetLocalTime
CloseHandle
GetTickCount
ReleaseMutex
GetDriveTypeW
FindAtomA
LoadLibraryA
GetProcessHeap
HeapCreate
CreateFileA
GetCommandLineA
ExitThread
LoadLibraryW
ReleaseMutex
GetFileAttributesW
user32
GetKeyState
GetClassInfoA
GetDlgItem
CreateWindowExA
DrawStateA
GetComboBoxInfo
DestroyCaret
FillRect
SetFocus
CloseWindow
GetClipCursor
DispatchMessageA
CallWindowProcA
cryptnet
CryptGetTimeValidObject
CertDllVerifyCTLUsage
CryptGetObjectUrl
CryptRetrieveObjectByUrlA
CryptCancelAsyncRetrieval
appwiz.cpl
ConfigStartMenu
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 336KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 404KB - Virtual size: 403KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ