Static task
static1
Behavioral task
behavioral1
Sample
a03d68c03ef5a8236362156bfe150df6baeaa2ba8e31b464a6aed7ca992b0b44.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a03d68c03ef5a8236362156bfe150df6baeaa2ba8e31b464a6aed7ca992b0b44.exe
Resource
win10v2004-20220812-en
General
-
Target
a03d68c03ef5a8236362156bfe150df6baeaa2ba8e31b464a6aed7ca992b0b44
-
Size
75KB
-
MD5
e3cea1f3fa806840aee426205e4208aa
-
SHA1
373f6d77cbe0950a7f120c991242ace9fee73f1d
-
SHA256
a03d68c03ef5a8236362156bfe150df6baeaa2ba8e31b464a6aed7ca992b0b44
-
SHA512
6fe1e5240883fd8408f7c25159386861586204bdf6a552906cff694f9d7e42d650cc668cbecd05a0342b25060b6ce593a24ba7e1bb129f86a0f456f2ac06d2cb
-
SSDEEP
1536:NaHou8wtCVwvNKH2hjH3ww3EphhSJ0FBc:NaIu9tg7Whz3ww3E7MJUB
Malware Config
Signatures
Files
-
a03d68c03ef5a8236362156bfe150df6baeaa2ba8e31b464a6aed7ca992b0b44.exe windows x86
3a53608e1170affeb15006476e7975c6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
CreateThread
GetComputerNameA
GetTickCount
GetSystemTime
GetFileAttributesW
GetDiskFreeSpaceW
GetCommandLineW
ResumeThread
lstrcmpiW
ResetEvent
SetEvent
ReleaseMutex
HeapCreate
FindAtomW
GetModuleHandleA
LocalFree
CloseHandle
LoadLibraryW
CreateFileA
user32
CreateWindowExA
SetFocus
DispatchMessageA
CloseWindow
FillRect
GetClipCursor
GetClassInfoA
CallWindowProcA
GetComboBoxInfo
DestroyCaret
DrawStateA
GetDlgItem
GetKeyState
MessageBoxA
cryptdlg
CertTrustInit
CertTrustFinalPolicy
CertConfigureTrustA
CertTrustCertPolicy
DecodeRecipientID
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE