Static task
static1
Behavioral task
behavioral1
Sample
227d87323cf82626b8cc8ff281ee59eca8f2d2338d07881d7b9b2795dd37c62a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
227d87323cf82626b8cc8ff281ee59eca8f2d2338d07881d7b9b2795dd37c62a.exe
Resource
win10v2004-20220901-en
General
-
Target
227d87323cf82626b8cc8ff281ee59eca8f2d2338d07881d7b9b2795dd37c62a
-
Size
307KB
-
MD5
9e11136df6b72361fa081f59c7e6795d
-
SHA1
4509669e50f84e163c04cf60f535b7c57714c88a
-
SHA256
227d87323cf82626b8cc8ff281ee59eca8f2d2338d07881d7b9b2795dd37c62a
-
SHA512
93783a63360356632fc24d6119235eae830f090fa94dedefcb3d854c04ecee075d883796b549710a329c1a23e640a394d8790692f4b0aa746447e96aa2656820
-
SSDEEP
6144:GC3jRPBqkuRmhVRHu+jkpu4x4YUx62ZIidPF8ciaIAjOQNQ4SEy4:lBtuRIPO+jkpxGYGHqiPkaIACQNQ4a4
Malware Config
Signatures
Files
-
227d87323cf82626b8cc8ff281ee59eca8f2d2338d07881d7b9b2795dd37c62a.exe windows x86
a13505eb520427dd8d1ae57cd88c2fb5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
SetEvent
LoadLibraryA
GetDiskFreeSpaceW
GetComputerNameA
GetModuleHandleA
lstrcmpW
GetCommandLineW
SetLastError
CreateThread
CreateFileA
GetSystemTime
FindAtomW
LocalFree
GetDriveTypeA
CloseHandle
GetTickCount
GetFileAttributesW
ReleaseMutex
ResetEvent
user32
CloseWindow
DestroyCaret
GetDlgItem
FillRect
CallWindowProcA
GetClipCursor
SetFocus
GetKeyState
DispatchMessageA
GetClassInfoA
CreateWindowExA
GetComboBoxInfo
DrawStateA
cryptdll
MD5Final
CDBuildVect
CDLocateRng
MD5Init
CDRegisterRng
desk.cpl
DisplaySaveSettings
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 348KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ