Static task
static1
Behavioral task
behavioral1
Sample
cd96e480984a8cb9af7315350ab24fe486bfd23c1c3245e67bd209e7a1250bd1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cd96e480984a8cb9af7315350ab24fe486bfd23c1c3245e67bd209e7a1250bd1.exe
Resource
win10v2004-20220812-en
General
-
Target
cd96e480984a8cb9af7315350ab24fe486bfd23c1c3245e67bd209e7a1250bd1
-
Size
59KB
-
MD5
14024a9510cd5c002e1ab67e9760c670
-
SHA1
30a37e780c0ec44042a6d941943f727f8fb93232
-
SHA256
cd96e480984a8cb9af7315350ab24fe486bfd23c1c3245e67bd209e7a1250bd1
-
SHA512
c24b30a2ee4ea92b18f8cbb5963f7d5d704d9353eaa9c04a4c194cb5b3d708833323cdaaf90393832ddf1c1afe080a9b33a171378cd333aa1bc0db617ada1405
-
SSDEEP
1536:kPM4E8uECBhxx8fvUxyVBMZSxEVpfG/0l:sYzE6h38f2yVBDUesl
Malware Config
Signatures
Files
-
cd96e480984a8cb9af7315350ab24fe486bfd23c1c3245e67bd209e7a1250bd1.exe windows x86
5aba6cd7cf2b4a40577e8a86520c2649
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentDirectoryA
lstrcpyA
GetComputerNameA
LoadLibraryExW
SetLastError
LocalFree
lstrlenA
UnmapViewOfFile
HeapCreate
GetCommandLineA
CreateProcessA
Sleep
GlobalUnlock
CreateFileW
PulseEvent
FindResourceW
CloseHandle
GetModuleHandleA
GetCurrentThreadId
FindClose
user32
FillRect
CreateWindowExA
DrawMenuBar
GetDlgItem
IsWindow
CallWindowProcA
DispatchMessageA
GetCaretPos
SetFocus
CheckRadioButton
CreateIcon
DrawEdge
GetDC
rsaenh
CPDeriveKey
CPHashData
CPDecrypt
CPSignHash
CPGenKey
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 43KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE