Static task
static1
Behavioral task
behavioral1
Sample
76183e854e0deab7dde44513327cc0907b5934a45ca85f194af5f58f8fb9df96.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
76183e854e0deab7dde44513327cc0907b5934a45ca85f194af5f58f8fb9df96.exe
Resource
win10v2004-20220812-en
General
-
Target
76183e854e0deab7dde44513327cc0907b5934a45ca85f194af5f58f8fb9df96
-
Size
28KB
-
MD5
6b2b6597dd463674001f77d438654ccb
-
SHA1
01d07f708e6cdafbc87ad764e645da37c1d7f06d
-
SHA256
76183e854e0deab7dde44513327cc0907b5934a45ca85f194af5f58f8fb9df96
-
SHA512
42b6c3c0554f008ff5bbd7b2418f1ee1f8393788dfe75191a3a7b50bf6748e766f3ae1054e7577cae5eee7cb368adb717ea2ed4e55c2a19c407646527429dfe3
-
SSDEEP
384:xy+ppmj1VahX4WaXzfwwXNyiDx10jaQpRveBj0YUSHNpXoEqPQ0:xy+ppmjfahXDMzfww9VypRvyLVqp
Malware Config
Signatures
Files
-
76183e854e0deab7dde44513327cc0907b5934a45ca85f194af5f58f8fb9df96.exe windows x86
62623e14345a8453a2a8bfc52428baf2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
HeapCreate
GetModuleHandleA
lstrlenW
LoadLibraryExA
TlsAlloc
CreateMutexA
GetEnvironmentVariableA
GetStdHandle
DeleteAtom
ReleaseMutex
CloseHandle
GlobalUnlock
GetProcessHeap
FindResourceA
GetCurrentThreadId
CreateFileA
GetExitCodeProcess
TlsGetValue
GlobalFree
user32
GetDC
GetDlgItem
DrawMenuBar
CallWindowProcA
FillRect
DrawEdge
SetFocus
IsWindow
CreateWindowExA
CreateMenu
CheckRadioButton
DispatchMessageA
GetCaretPos
rsaenh
CPGenKey
CPHashData
CPDeriveKey
CPDecrypt
CPSignHash
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE