Static task
static1
Behavioral task
behavioral1
Sample
4ac56c80367f417fc38c07107b76e0ab7ff48a472eea9c86aacca54761b409cb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4ac56c80367f417fc38c07107b76e0ab7ff48a472eea9c86aacca54761b409cb.exe
Resource
win10v2004-20220901-en
General
-
Target
4ac56c80367f417fc38c07107b76e0ab7ff48a472eea9c86aacca54761b409cb
-
Size
66KB
-
MD5
473bb8251751b37b0dfa20c9c5520b70
-
SHA1
c07955efce0a4cc85c4583d1ab065628b4187931
-
SHA256
4ac56c80367f417fc38c07107b76e0ab7ff48a472eea9c86aacca54761b409cb
-
SHA512
8c9b4508b667fd8b78a7c6b58b842edc2a1cae876f30c51c460b6204fe95ce973e4762c15da515f777bbf0963cd9c5d4b970eb3f823eea34c6b0b9c41c31a07a
-
SSDEEP
1536:mUjejf6j8VgcKsAnuW6geKuwPm4Pk1yIygOdSZ:mjfdKcKsAnuWxqwm4gTfOdSZ
Malware Config
Signatures
Files
-
4ac56c80367f417fc38c07107b76e0ab7ff48a472eea9c86aacca54761b409cb.exe windows x86
30484ba80e636a1e6fa228edc548cf49
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
GetProcessHeap
GlobalUnlock
LoadLibraryExA
GetEnvironmentVariableA
GlobalFree
CreateFileA
TlsGetValue
FindResourceA
HeapCreate
lstrlenW
CloseHandle
TlsAlloc
DeleteAtom
SetLastError
CreateMutexA
GetExitCodeProcess
GetModuleHandleA
GetStdHandle
ReleaseMutex
user32
CallWindowProcA
FillRect
DrawMenuBar
SetFocus
CreateWindowExA
IsWindow
GetDC
GetDlgItem
CreateMenu
CheckRadioButton
GetCaretPos
DispatchMessageA
DrawEdge
rsaenh
CPDecrypt
CPGenKey
CPSignHash
CPHashData
CPDeriveKey
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 50KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE