Static task
static1
Behavioral task
behavioral1
Sample
837784fb6d9ded71360782d504dbde96129b0dbc9f5384ba6213885f334a743a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
837784fb6d9ded71360782d504dbde96129b0dbc9f5384ba6213885f334a743a.exe
Resource
win10v2004-20220812-en
General
-
Target
837784fb6d9ded71360782d504dbde96129b0dbc9f5384ba6213885f334a743a
-
Size
75KB
-
MD5
ed24855a1860e9d9f63b284963b4e031
-
SHA1
7090957a3bf0e211a2f0c0735d62a3e2a680b3e3
-
SHA256
837784fb6d9ded71360782d504dbde96129b0dbc9f5384ba6213885f334a743a
-
SHA512
ab39b7f2495e78502cbd520739a683906dab08958488e597def0517fbddf0a2b7880ba74a78171bcaae8e9bcd66d011d3a29a01b4b7c4e017e98e5becec65c26
-
SSDEEP
1536:iaHRu8wtCVwvNKH2hjH3ww3EphhSJ0FBc:iaxu9tg7Whz3ww3E7MJUB
Malware Config
Signatures
Files
-
837784fb6d9ded71360782d504dbde96129b0dbc9f5384ba6213885f334a743a.exe windows x86
3a53608e1170affeb15006476e7975c6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
CreateThread
GetComputerNameA
GetTickCount
GetSystemTime
GetFileAttributesW
GetDiskFreeSpaceW
GetCommandLineW
ResumeThread
lstrcmpiW
ResetEvent
SetEvent
ReleaseMutex
HeapCreate
FindAtomW
GetModuleHandleA
LocalFree
CloseHandle
LoadLibraryW
CreateFileA
user32
CreateWindowExA
SetFocus
DispatchMessageA
CloseWindow
FillRect
GetClipCursor
GetClassInfoA
CallWindowProcA
GetComboBoxInfo
DestroyCaret
DrawStateA
GetDlgItem
GetKeyState
MessageBoxA
cryptdlg
CertTrustInit
CertTrustFinalPolicy
CertConfigureTrustA
CertTrustCertPolicy
DecodeRecipientID
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE