Static task
static1
Behavioral task
behavioral1
Sample
bafab13a8fc1cc538dc24fdbc43d1c5a621b86edc4566ee821645618cd38b0bb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bafab13a8fc1cc538dc24fdbc43d1c5a621b86edc4566ee821645618cd38b0bb.exe
Resource
win10v2004-20220901-en
General
-
Target
bafab13a8fc1cc538dc24fdbc43d1c5a621b86edc4566ee821645618cd38b0bb
-
Size
346KB
-
MD5
406eee06a0ce987ac033357ccbb7fb7e
-
SHA1
d903fd934a11a79d515ffba39d6bd79ed4901a7d
-
SHA256
bafab13a8fc1cc538dc24fdbc43d1c5a621b86edc4566ee821645618cd38b0bb
-
SHA512
b0fc169356690231317da38251a487f7642d3accf6a243a6e61748781e6a744e1762445972941cfc020f444c16067e8695f872a0b8b0d432794d9d12c4ba35e8
-
SSDEEP
6144:392aJ8dOPK7rte7fkO8jIIdoiIqaltHE+Oz1JjUmNu082n9DpOwc/zb357Ktf:3sHIutK+ISojNltHJOhFtg22n
Malware Config
Signatures
Files
-
bafab13a8fc1cc538dc24fdbc43d1c5a621b86edc4566ee821645618cd38b0bb.exe windows x86
61dddf7e18a185834afad56b927348ea
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
GetCurrentDirectoryA
HeapCreate
GetModuleHandleA
CreateFileW
lstrcpyA
lstrlenA
UnmapViewOfFile
Sleep
ResetEvent
CreateThread
CloseHandle
GetSystemTime
FindClose
LoadLibraryW
PulseEvent
GetComputerNameA
GetCommandLineW
GlobalUnlock
LocalFree
user32
SetFocus
CreateWindowExA
CheckRadioButton
FillRect
GetScrollBarInfo
DrawMenuBar
DispatchMessageA
GetKeyState
IsWindow
DrawEdge
CallWindowProcA
GetDlgItem
GetDC
cryptui
CryptUIDlgCertMgr
LocalEnroll
CryptUIDlgSelectCA
CryptUIDlgSelectStoreA
WizardFree
timedate.cpl
CPlApplet
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 580KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 66KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ