Static task
static1
Behavioral task
behavioral1
Sample
c4fff25f0badbfb061abb37e1b66834184359ce4a662a1a9eb6d200862d1cdcb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c4fff25f0badbfb061abb37e1b66834184359ce4a662a1a9eb6d200862d1cdcb.exe
Resource
win10v2004-20220812-en
General
-
Target
c4fff25f0badbfb061abb37e1b66834184359ce4a662a1a9eb6d200862d1cdcb
-
Size
810KB
-
MD5
eee1e6cb972697d287ba5739a71a3c68
-
SHA1
9718b5e1960b0530bc4717d35205e70beacc1d0c
-
SHA256
c4fff25f0badbfb061abb37e1b66834184359ce4a662a1a9eb6d200862d1cdcb
-
SHA512
42a69ca25a1177acc2c015d0781f71e399a0ac1aa101ba6892c906c6334ec70fc4f0de90d86952e4b38e9bb6d27a8d5e9a5cfca7dd2af3c783a76a0f1fbc9f34
-
SSDEEP
24576:9pdZnJLb9cN2TlwwX7flTkgsGGszOe09TU6vMuwAOUc:JrLb9/lwwrlTkfw1OUuwKc
Malware Config
Signatures
Files
-
c4fff25f0badbfb061abb37e1b66834184359ce4a662a1a9eb6d200862d1cdcb.exe windows x86
4009ddd3bac7502911f5ae355b96e28e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
GetLastError
SetLastError
VirtualAlloc
TlsGetValue
FindClose
FindAtomA
CreateFileMappingW
TlsAlloc
GetComputerNameA
ExitProcess
GetTickCount
GetLocalTime
GetPrivateProfileIntA
CloseHandle
GetModuleHandleW
lstrlenW
GetStdHandle
GlobalFree
MapViewOfFile
user32
DispatchMessageA
GetDlgItem
DestroyCaret
CloseWindow
GetClientRect
EndDialog
FillRect
GetCaretPos
GetClassInfoA
DrawStateA
CreateWindowExA
CallWindowProcA
GetMenu
clbcatq
SetSetupSave
DllGetClassObject
ComPlusMigrate
CheckMemoryGates
SetupOpen
ir50_32
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 801KB - Virtual size: 800KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ