Static task
static1
Behavioral task
behavioral1
Sample
85713a254392315ec021060439f8e3ebd4de247ed89fabcd576cb9f21e029eb0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
85713a254392315ec021060439f8e3ebd4de247ed89fabcd576cb9f21e029eb0.exe
Resource
win10v2004-20221111-en
General
-
Target
85713a254392315ec021060439f8e3ebd4de247ed89fabcd576cb9f21e029eb0
-
Size
65KB
-
MD5
bdf624b7683010bc9a646f8f33aa2908
-
SHA1
ec21df002a05d71be62ad16fa56c343ed64e5917
-
SHA256
85713a254392315ec021060439f8e3ebd4de247ed89fabcd576cb9f21e029eb0
-
SHA512
d2d3222f1cf5fa88e092425df9c2b6c05e617d63c4f3adb948a4a3eaca7d6378ad91db27f527364f3881d2d5f9848808263b8fa005ed07b909fc3ed75858398b
-
SSDEEP
1536:Ljf+C8VgcKsAnuW6geKuwPmz5555555555555AZ6LrJyNchXDvU:XfaKcKsAnuWxqwmz5555555555555AYm
Malware Config
Signatures
Files
-
85713a254392315ec021060439f8e3ebd4de247ed89fabcd576cb9f21e029eb0.exe windows x86
1ca15d1722516b012ae7b5c2ed97e70e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFree
GlobalUnlock
TlsGetValue
CloseHandle
SetLastError
HeapCreate
ReleaseMutex
GetModuleHandleA
LoadLibraryExA
GetProcessHeap
CreateFileA
GetExitCodeProcess
lstrlenW
TlsAlloc
FindResourceA
GetCurrentThreadId
CreateMutexA
DeleteAtom
GetStdHandle
GetEnvironmentVariableA
user32
DispatchMessageA
DrawEdge
CheckRadioButton
CreateWindowExA
GetDlgItem
GetDC
CreateMenu
FillRect
SetFocus
IsWindow
DrawMenuBar
GetCaretPos
CallWindowProcA
rsaenh
CPDeriveKey
CPGenKey
CPSignHash
CPHashData
CPDecrypt
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 50KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE