Static task
static1
Behavioral task
behavioral1
Sample
88ef9d241330b2689da2ff2aecc5fdceac356460655d00d49d1f5c2ed4c6e821.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
88ef9d241330b2689da2ff2aecc5fdceac356460655d00d49d1f5c2ed4c6e821.exe
Resource
win10v2004-20220812-en
General
-
Target
88ef9d241330b2689da2ff2aecc5fdceac356460655d00d49d1f5c2ed4c6e821
-
Size
36KB
-
MD5
736eef86441789bb1eea30d6bc06af10
-
SHA1
34a26b6e72670be1e881c923cf84d305da1a5845
-
SHA256
88ef9d241330b2689da2ff2aecc5fdceac356460655d00d49d1f5c2ed4c6e821
-
SHA512
190779f335bf4303dba89b3b01970089eb0326b427009149b89864a98cd18e3370025768564f44da8d110f0df38fc442ac98a98820ec478dfb15472eb43981dd
-
SSDEEP
384:+JEKyf3ZE3s4Mphzji0aXIP7Z99JBu5cw:KEPf3fHT97V3Oc
Malware Config
Signatures
Files
-
88ef9d241330b2689da2ff2aecc5fdceac356460655d00d49d1f5c2ed4c6e821.exe windows x86
fc75a24ace593fab66484539adf75069
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryW
FindAtomW
GetModuleHandleA
ResumeThread
GetDiskFreeSpaceW
ResetEvent
LocalFree
ReleaseMutex
GetTickCount
CreateThread
SetLastError
CloseHandle
lstrcmpiW
GetFileAttributesW
SetEvent
HeapCreate
GetCommandLineW
GetComputerNameA
GetSystemTime
CreateFileA
user32
GetClipCursor
CreateWindowExA
SetFocus
GetComboBoxInfo
CloseWindow
DispatchMessageA
DestroyCaret
GetKeyState
DrawStateA
GetClassInfoA
FillRect
CallWindowProcA
GetDlgItem
MessageBoxA
cryptdlg
CertTrustCertPolicy
CertTrustFinalPolicy
CertConfigureTrustA
CertTrustInit
DecodeRecipientID
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE