Static task
static1
Behavioral task
behavioral1
Sample
d204075cb2fc190e1db8ce7f25bdd878b408f73d738db833055ec76c4a17096f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d204075cb2fc190e1db8ce7f25bdd878b408f73d738db833055ec76c4a17096f.exe
Resource
win10v2004-20221111-en
General
-
Target
d204075cb2fc190e1db8ce7f25bdd878b408f73d738db833055ec76c4a17096f
-
Size
102KB
-
MD5
c158d597eb0a4c2f61fbfee31059040f
-
SHA1
668f30efecff0e5fd54c4a2a2d44a68636018f79
-
SHA256
d204075cb2fc190e1db8ce7f25bdd878b408f73d738db833055ec76c4a17096f
-
SHA512
bdc1671058c9acd6301507d36a19ea245b9015eaa23b92432bc1bb6791ac83e2b790d53e3c07fb391ef970170fca052d0f9091879b2ddac95fa0e6609cae7458
-
SSDEEP
1536:aq4ZwtCVwvNKH2h8qUWFudX9UvHnnTUlcVEyP2/fOduClFXM:apCtg7WhHUWgonw6V5+3ObX
Malware Config
Signatures
Files
-
d204075cb2fc190e1db8ce7f25bdd878b408f73d738db833055ec76c4a17096f.exe windows x86
e3489ee24c838a56322122717fcc308a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindAtomW
GetFileAttributesW
ReleaseMutex
GetDiskFreeSpaceW
GetTickCount
CreateThread
ResetEvent
GetCommandLineW
HeapCreate
SetLastError
GetModuleHandleA
lstrcmpiW
GetSystemTime
LocalFree
SetEvent
GetComputerNameA
CreateFileA
LoadLibraryW
ResumeThread
CloseHandle
user32
DestroyCaret
GetClipCursor
SetFocus
DrawStateA
GetClassInfoA
GetKeyState
FillRect
CallWindowProcA
DispatchMessageA
GetComboBoxInfo
CreateWindowExA
CloseWindow
GetDlgItem
MessageBoxA
cryptdlg
CertTrustCertPolicy
DecodeRecipientID
CertTrustInit
CertTrustFinalPolicy
CertConfigureTrustA
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE