Static task
static1
Behavioral task
behavioral1
Sample
55bce597e3d48f7f47ec7361d7adbd4c8b6caa264d77881e2b15f3acdb84f99c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
55bce597e3d48f7f47ec7361d7adbd4c8b6caa264d77881e2b15f3acdb84f99c.exe
Resource
win10v2004-20220901-en
General
-
Target
55bce597e3d48f7f47ec7361d7adbd4c8b6caa264d77881e2b15f3acdb84f99c
-
Size
200KB
-
MD5
eefcb85d7f487a9734cc346ef9dd6054
-
SHA1
35c36f6f54d10cd4650bf0f2733a88ca2fa383ff
-
SHA256
55bce597e3d48f7f47ec7361d7adbd4c8b6caa264d77881e2b15f3acdb84f99c
-
SHA512
b6cde7eb22ab9d1bd9f510eccaf9e1495783c80a1aa32946b8c01c25319875d1d90457a1a8c443b60ba1724559b32ad91777dae2d31bb246bb9013026ecc09ee
-
SSDEEP
3072:kkSnmfnRe3dpYCV/IsWkcIofD2wcQebhqjmI/T0tJpo+vGLzzxDa3vpkQ40nr:inWs3YwmywvgpvtJpSzxDahD
Malware Config
Signatures
Files
-
55bce597e3d48f7f47ec7361d7adbd4c8b6caa264d77881e2b15f3acdb84f99c.exe windows x86
a2defc25b95b5c6feb825ab729e68a6e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
DeleteAtom
GetModuleHandleA
GetModuleFileNameA
FindClose
CloseHandle
WaitForMultipleObjects
GetDriveTypeW
ClearCommBreak
GetCommandLineA
SetEndOfFile
AddAtomA
ExitThread
HeapFree
IsBadWritePtr
RemoveDirectoryA
FindAtomA
SetVolumeLabelA
HeapCreate
CreateSemaphoreW
RemoveDirectoryA
CreateDirectoryA
GetFileType
WriteFile
CreatePipe
cryptui
CryptUIDlgViewContext
CryptUIWizBuildCTL
CryptUIStartCertMgr
WizardFree
CryptUIWizDigitalSign
DllUnregisterServer
WizardFree
LocalEnroll
CryptUIWizExport
CryptUIWizImport
CryptUIDlgFreeCAContext
DllRegisterServer
LocalEnrollNoDS
msvidc32
DriverProc
DriverProc
DriverProc
DriverProc
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 191KB - Virtual size: 191KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE