Static task
static1
Behavioral task
behavioral1
Sample
73a784f985a1e9e660801e1d7c0f0f1c63e615cd9aec1635427a95d30d3519f1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
73a784f985a1e9e660801e1d7c0f0f1c63e615cd9aec1635427a95d30d3519f1.exe
Resource
win10v2004-20220812-en
General
-
Target
73a784f985a1e9e660801e1d7c0f0f1c63e615cd9aec1635427a95d30d3519f1
-
Size
75KB
-
MD5
75618cf49f9b22c64252a641d5aeb6aa
-
SHA1
66e490ca3d51cb94ccd4ca1745675cd3e4f9755f
-
SHA256
73a784f985a1e9e660801e1d7c0f0f1c63e615cd9aec1635427a95d30d3519f1
-
SHA512
1033b79a1f3003727c5538a4c383c38680d43273f0b7f3d0fd674c3e3d115000b36834ae353258e7a0cfa799f4e465e45ece3fd1a82c7c24d65de8e4f511d561
-
SSDEEP
1536:DaHou8wtCVwvNKH2hjH3ww3EphhSJ0FBc:DaIu9tg7Whz3ww3E7MJUB
Malware Config
Signatures
Files
-
73a784f985a1e9e660801e1d7c0f0f1c63e615cd9aec1635427a95d30d3519f1.exe windows x86
3a53608e1170affeb15006476e7975c6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
CreateThread
GetComputerNameA
GetTickCount
GetSystemTime
GetFileAttributesW
GetDiskFreeSpaceW
GetCommandLineW
ResumeThread
lstrcmpiW
ResetEvent
SetEvent
ReleaseMutex
HeapCreate
FindAtomW
GetModuleHandleA
LocalFree
CloseHandle
LoadLibraryW
CreateFileA
user32
CreateWindowExA
SetFocus
DispatchMessageA
CloseWindow
FillRect
GetClipCursor
GetClassInfoA
CallWindowProcA
GetComboBoxInfo
DestroyCaret
DrawStateA
GetDlgItem
GetKeyState
MessageBoxA
cryptdlg
CertTrustInit
CertTrustFinalPolicy
CertConfigureTrustA
CertTrustCertPolicy
DecodeRecipientID
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE