Static task
static1
Behavioral task
behavioral1
Sample
fe9fb6ff4695ee528e7ad4c78358b1c54b61a14aaac70c3a3eab488fa424f131.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fe9fb6ff4695ee528e7ad4c78358b1c54b61a14aaac70c3a3eab488fa424f131.exe
Resource
win10v2004-20221111-en
General
-
Target
fe9fb6ff4695ee528e7ad4c78358b1c54b61a14aaac70c3a3eab488fa424f131
-
Size
43KB
-
MD5
b62ff666653b1bb58df674f6f89ce17e
-
SHA1
5c88f093fe020306309944c76e5b10e705dd8101
-
SHA256
fe9fb6ff4695ee528e7ad4c78358b1c54b61a14aaac70c3a3eab488fa424f131
-
SHA512
f0a51f56829f7ae0250e668c4d688d927bae89027986a578d48be6102c9d4a20d9d2467ab781a93ae1eeca9ac1191e6f5dde9e1543c6a3b290d64ddfeafa4637
-
SSDEEP
192:6K0YXJlUWA5O3EyF7OH2KXpYY5CPL2QgYj4QPFiv+TXQg2:f0YZmWAHye2K5YY5Idm+TAg2
Malware Config
Signatures
Files
-
fe9fb6ff4695ee528e7ad4c78358b1c54b61a14aaac70c3a3eab488fa424f131.exe windows x86
e1a771a7ba7eced3cd288367d4d2317a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileW
FindClose
lstrcpyA
LoadLibraryW
GetComputerNameA
LocalFree
CreateThread
UnmapViewOfFile
GetCommandLineW
ResetEvent
GetSystemTime
CloseHandle
GetTickCount
GetModuleHandleA
lstrlenA
GlobalUnlock
HeapCreate
GetCurrentDirectoryA
PulseEvent
Sleep
user32
GetKeyState
GetDlgItem
CheckRadioButton
DispatchMessageA
DrawEdge
IsWindow
GetDC
CreateWindowExA
GetScrollBarInfo
CallWindowProcA
FillRect
SetFocus
DrawMenuBar
cryptui
LocalEnroll
CryptUIDlgSelectStoreA
CryptUIDlgCertMgr
CryptUIDlgSelectCA
WizardFree
appwiz.cpl
ConfigStartMenu
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 36KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gtemimd Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE