Static task
static1
Behavioral task
behavioral1
Sample
977c96c5f42b5f82158a66c78519d71e82df096bbb5dba50593c97304b2cd7c9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
977c96c5f42b5f82158a66c78519d71e82df096bbb5dba50593c97304b2cd7c9.exe
Resource
win10v2004-20220901-en
General
-
Target
977c96c5f42b5f82158a66c78519d71e82df096bbb5dba50593c97304b2cd7c9
-
Size
58KB
-
MD5
e5dea0a97327a55caa556ca539d1146f
-
SHA1
9e2aab08c0b3ca24c2c5a91e4eb0c1e2f39a4285
-
SHA256
977c96c5f42b5f82158a66c78519d71e82df096bbb5dba50593c97304b2cd7c9
-
SHA512
ac3e8d356826d6f01dc8527bd0c0aaf0200a9d5fb51cfe0127909380af6b76453fc32af7f5037e0ed4e00fbeaf8987817b2d21c307874525573e2545f65a85c3
-
SSDEEP
768:bw82cZiUzAr4rS6heyY1soCG4IXXLrXhYGJYStd+0m1UmMsPOq:k82wi4uSS6MyYuoqIXXLrXzuef9j
Malware Config
Signatures
Files
-
977c96c5f42b5f82158a66c78519d71e82df096bbb5dba50593c97304b2cd7c9.exe windows x86
ea9083d6daf4a96a9f4175e7977aa0a0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceW
CreateMutexA
CloseHandle
TlsGetValue
GetStdHandle
GetModuleHandleA
SetLastError
LoadLibraryExA
GetProcessHeap
lstrcpyA
GetEnvironmentVariableA
CreateFileW
lstrlenW
HeapCreate
GlobalUnlock
ReleaseMutex
GlobalFree
GetCurrentThreadId
GetExitCodeProcess
UnmapViewOfFile
user32
CallWindowProcA
GetCaretPos
CreateWindowExA
GetDlgItem
CheckRadioButton
IsWindow
GetDC
FillRect
CreateMenu
DrawEdge
SetFocus
DispatchMessageA
DrawMenuBar
rsaenh
CPDecrypt
CPDeriveKey
CPGenKey
CPHashData
CPSignHash
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 43KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE