Static task
static1
Behavioral task
behavioral1
Sample
998c42b141e855a52ea4fe18d8b95aa2c0c880c26195dcff3ed5eff352675a61.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
998c42b141e855a52ea4fe18d8b95aa2c0c880c26195dcff3ed5eff352675a61.exe
Resource
win10v2004-20220901-en
General
-
Target
998c42b141e855a52ea4fe18d8b95aa2c0c880c26195dcff3ed5eff352675a61
-
Size
75KB
-
MD5
d7fbf8eee18852007f14854fc09be44f
-
SHA1
99ebd69626cc41e899971d5fbe8584655163c1a6
-
SHA256
998c42b141e855a52ea4fe18d8b95aa2c0c880c26195dcff3ed5eff352675a61
-
SHA512
9d0ad3b79c57ee46d52ed4f7c44e8f3caf204e4f8af89742731a961884cee3d46f2f23d9a24231f8ae44780448eeac0c96a35a034c2c19d4498a334808f22aaf
-
SSDEEP
1536:eaHIu8wtCVwvNKH2hjH3ww3EphhSJ0FBc:eaou9tg7Whz3ww3E7MJUB
Malware Config
Signatures
Files
-
998c42b141e855a52ea4fe18d8b95aa2c0c880c26195dcff3ed5eff352675a61.exe windows x86
3a53608e1170affeb15006476e7975c6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
CreateThread
GetComputerNameA
GetTickCount
GetSystemTime
GetFileAttributesW
GetDiskFreeSpaceW
GetCommandLineW
ResumeThread
lstrcmpiW
ResetEvent
SetEvent
ReleaseMutex
HeapCreate
FindAtomW
GetModuleHandleA
LocalFree
CloseHandle
LoadLibraryW
CreateFileA
user32
CreateWindowExA
SetFocus
DispatchMessageA
CloseWindow
FillRect
GetClipCursor
GetClassInfoA
CallWindowProcA
GetComboBoxInfo
DestroyCaret
DrawStateA
GetDlgItem
GetKeyState
MessageBoxA
cryptdlg
CertTrustInit
CertTrustFinalPolicy
CertConfigureTrustA
CertTrustCertPolicy
DecodeRecipientID
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE