Static task
static1
Behavioral task
behavioral1
Sample
787f2b3df7fe13f8d16fae726eb10a092675f5ed697c9429482d748ccaaa20c4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
787f2b3df7fe13f8d16fae726eb10a092675f5ed697c9429482d748ccaaa20c4.exe
Resource
win10v2004-20220812-en
General
-
Target
787f2b3df7fe13f8d16fae726eb10a092675f5ed697c9429482d748ccaaa20c4
-
Size
11KB
-
MD5
76664f3f98145c845c8d652bf8dc3c9a
-
SHA1
785682e739a718258d4fc8c7c8d29ffc065d17ee
-
SHA256
787f2b3df7fe13f8d16fae726eb10a092675f5ed697c9429482d748ccaaa20c4
-
SHA512
7403d6347021baa791741813b4f422d19b1d07891828c3c7fe188d9f79b6e01140f5b2738788d1d42cb539a7554441ae68af93c772be46f1d178d9c9c517dca6
-
SSDEEP
96:yPC9ey8RTCOBgVSR9bZwDppJh1aW2GQuau0IgqIoYkBYk/ORgmDS8MCMtve5X:yvy8RTT9R9bSDpj/apjYPXW2vRRvQX
Malware Config
Signatures
Files
-
787f2b3df7fe13f8d16fae726eb10a092675f5ed697c9429482d748ccaaa20c4.exe windows x86
12da3730ea00a863d16f20b1edb0b5dd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
UnmapViewOfFile
lstrlenA
LocalFree
HeapCreate
FormatMessageA
GetComputerNameA
GetSystemTime
GetModuleHandleA
SetLastError
LocalUnlock
GetTickCount
Sleep
ResetEvent
GetCommandLineW
GetDiskFreeSpaceA
CreateThread
CloseHandle
FindVolumeClose
LoadLibraryW
user32
GetDlgItem
CheckRadioButton
DrawEdge
FillRect
DrawMenuBar
CreateWindowExA
DrawStateA
DispatchMessageA
CallWindowProcA
SetFocus
IsWindow
GetDC
GetComboBoxInfo
advapi32
RegEnumValueA
RegDeleteKeyA
FreeSid
RegCloseKey
IsTokenUntrusted
hdwwiz.cpl
AddHardwareWizard
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 628KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ