Static task
static1
Behavioral task
behavioral1
Sample
a50b438e90be60de7edfbb00a87a1232fd2d5e7cf630dfe3b58dfd7b92f5fdba.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a50b438e90be60de7edfbb00a87a1232fd2d5e7cf630dfe3b58dfd7b92f5fdba.exe
Resource
win10v2004-20220812-en
General
-
Target
a50b438e90be60de7edfbb00a87a1232fd2d5e7cf630dfe3b58dfd7b92f5fdba
-
Size
100KB
-
MD5
ccce82decca9aa9fd8e11022be9584a6
-
SHA1
a0ab43d89950e79e6e5649b90ccd3e2a7fa74c9a
-
SHA256
a50b438e90be60de7edfbb00a87a1232fd2d5e7cf630dfe3b58dfd7b92f5fdba
-
SHA512
63226d811532415e038ed37d81b9570fb22aa8fd80a2dc29c8fc72f2555bcea2612e20b1ec0f58b5d5a671fb97da6d85bfd366e421329820fbbaed5d82f637af
-
SSDEEP
3072:OYxsrIitg7WhHwx7TtG5sDaOzfe3bXwN29QEf:yD3WfeLXAMf
Malware Config
Signatures
Files
-
a50b438e90be60de7edfbb00a87a1232fd2d5e7cf630dfe3b58dfd7b92f5fdba.exe windows x86
45a93aa697ca2d88c83465fdcd27e19e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiW
CreateFileA
GetTickCount
GetCommandLineW
GetDiskFreeSpaceW
ResumeThread
GetModuleHandleA
HeapCreate
CloseHandle
CreateThread
GetFileAttributesW
FindAtomW
LocalFree
GetComputerNameA
SetLastError
SetEvent
GetSystemTime
ReleaseMutex
LoadLibraryW
ResetEvent
user32
DestroyCaret
CallWindowProcA
CloseWindow
DrawStateA
DispatchMessageA
GetClipCursor
SetFocus
CreateWindowExA
FillRect
GetKeyState
GetClassInfoA
GetComboBoxInfo
GetDlgItem
MessageBoxA
cryptdlg
CertTrustCertPolicy
CertTrustInit
DecodeRecipientID
CertTrustFinalPolicy
CertConfigureTrustA
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 87KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE