Static task
static1
Behavioral task
behavioral1
Sample
eaa1c4b669db6f90b184a4910d698b00d0d6ce33bc2a8a2269c861546950791b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
eaa1c4b669db6f90b184a4910d698b00d0d6ce33bc2a8a2269c861546950791b.exe
Resource
win10v2004-20220901-en
General
-
Target
eaa1c4b669db6f90b184a4910d698b00d0d6ce33bc2a8a2269c861546950791b
-
Size
101KB
-
MD5
fa92af07a080e81aa63ac7e2b53aafc2
-
SHA1
b1bd35b24104cb3bcfeedf92df0283917108b243
-
SHA256
eaa1c4b669db6f90b184a4910d698b00d0d6ce33bc2a8a2269c861546950791b
-
SHA512
79cb54acf1a2b92ae94e8cc10094fa02d05631af77e440a330dc677511609ae22f42b9630908853695e29f5286baca92d5509b94a94c11d3d23e74427145eb41
-
SSDEEP
1536:eq4ZwtCVwvNKH2h8qUWFudX9UvHiYmjUQvYBGoKry4O:epCtg7WhHUWgoiYNQvYE+
Malware Config
Signatures
Files
-
eaa1c4b669db6f90b184a4910d698b00d0d6ce33bc2a8a2269c861546950791b.exe windows x86
e3489ee24c838a56322122717fcc308a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindAtomW
GetFileAttributesW
ReleaseMutex
GetDiskFreeSpaceW
GetTickCount
CreateThread
ResetEvent
GetCommandLineW
HeapCreate
SetLastError
GetModuleHandleA
lstrcmpiW
GetSystemTime
LocalFree
SetEvent
GetComputerNameA
CreateFileA
LoadLibraryW
ResumeThread
CloseHandle
user32
DestroyCaret
GetClipCursor
SetFocus
DrawStateA
GetClassInfoA
GetKeyState
FillRect
CallWindowProcA
DispatchMessageA
GetComboBoxInfo
CreateWindowExA
CloseWindow
GetDlgItem
MessageBoxA
cryptdlg
CertTrustCertPolicy
DecodeRecipientID
CertTrustInit
CertTrustFinalPolicy
CertConfigureTrustA
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE