Static task
static1
Behavioral task
behavioral1
Sample
4427c354ddd0a3814c98f14ae8b72ade1ae18e0d44635e5aa2c3ec38f817c0b6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4427c354ddd0a3814c98f14ae8b72ade1ae18e0d44635e5aa2c3ec38f817c0b6.exe
Resource
win10v2004-20221111-en
General
-
Target
4427c354ddd0a3814c98f14ae8b72ade1ae18e0d44635e5aa2c3ec38f817c0b6
-
Size
28KB
-
MD5
33175e60b66d7cdcb563c46b400d3cdb
-
SHA1
d5c1a4e591ff80dea17233903859d85fd3948ad7
-
SHA256
4427c354ddd0a3814c98f14ae8b72ade1ae18e0d44635e5aa2c3ec38f817c0b6
-
SHA512
ac3f021e5bdaee1eafaee8705b1dc0ec53c063073f81fe0a16989c6c20f833e89a2cf19a69c2c0aa0025e896e8a97ecd1cc5d0e8ebd38ba90e4ed5c214723237
-
SSDEEP
384:Qy+ppmj1VOhX4WaXzfwwXNyiDx10jaQpRveBj0YUSHNpXoEqPQ0:Qy+ppmjfOhXDMzfww9VypRvyLVqp
Malware Config
Signatures
Files
-
4427c354ddd0a3814c98f14ae8b72ade1ae18e0d44635e5aa2c3ec38f817c0b6.exe windows x86
62623e14345a8453a2a8bfc52428baf2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
HeapCreate
GetModuleHandleA
lstrlenW
LoadLibraryExA
TlsAlloc
CreateMutexA
GetEnvironmentVariableA
GetStdHandle
DeleteAtom
ReleaseMutex
CloseHandle
GlobalUnlock
GetProcessHeap
FindResourceA
GetCurrentThreadId
CreateFileA
GetExitCodeProcess
TlsGetValue
GlobalFree
user32
GetDC
GetDlgItem
DrawMenuBar
CallWindowProcA
FillRect
DrawEdge
SetFocus
IsWindow
CreateWindowExA
CreateMenu
CheckRadioButton
DispatchMessageA
GetCaretPos
rsaenh
CPGenKey
CPHashData
CPDeriveKey
CPDecrypt
CPSignHash
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE