Static task
static1
Behavioral task
behavioral1
Sample
cd50e136acd2a618fe756b8582f9350899b1575b941c9c689f74b1131a04d9de.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cd50e136acd2a618fe756b8582f9350899b1575b941c9c689f74b1131a04d9de.exe
Resource
win10v2004-20221111-en
General
-
Target
cd50e136acd2a618fe756b8582f9350899b1575b941c9c689f74b1131a04d9de
-
Size
810KB
-
MD5
606f74ae5892e902f2d148fa3ae1bc45
-
SHA1
af3c52b4a6f09ea1364a26746c68d42b18f95803
-
SHA256
cd50e136acd2a618fe756b8582f9350899b1575b941c9c689f74b1131a04d9de
-
SHA512
7d6831c4878c93323349ce008a7f9cb8618c96ff4691ed02bc081d0e48abc16896dc13ee42bd2eb4efa4c8a9e401ad9c0802df26e29989ef9edd7f2876c7eace
-
SSDEEP
24576:dUaZDiW2/couNqHlD5Domk0OsJp0zFFIqd/uI:djDiXuNqHfzXO7F9d/
Malware Config
Signatures
Files
-
cd50e136acd2a618fe756b8582f9350899b1575b941c9c689f74b1131a04d9de.exe windows x86
55f116129db24b0bf80e1f56a5ceb15f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
lstrlenW
TlsAlloc
GetLocalTime
SetLastError
MapViewOfFile
FindAtomA
GetTickCount
GetModuleHandleW
VirtualAlloc
GetComputerNameA
ExitProcess
CreateFileMappingW
GetLastError
GetPrivateProfileIntA
GlobalFree
GetStdHandle
TlsGetValue
CloseHandle
FindClose
user32
DrawStateA
CallWindowProcA
GetCaretPos
GetMenu
GetClientRect
GetDlgItem
EndDialog
DestroyCaret
FillRect
CloseWindow
GetClassInfoA
CreateWindowExA
DispatchMessageA
cryptui
CryptUIDlgSelectCA
CryptUIDlgSelectStoreA
LocalEnroll
CryptUIDlgCertMgr
WizardFree
ir50_32
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 801KB - Virtual size: 800KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ