Static task
static1
Behavioral task
behavioral1
Sample
57b2fd7a461e836d567ed6a94b25b2b66e1277e734514ab12e3f1330a904f42d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
57b2fd7a461e836d567ed6a94b25b2b66e1277e734514ab12e3f1330a904f42d.exe
Resource
win10v2004-20220812-en
General
-
Target
57b2fd7a461e836d567ed6a94b25b2b66e1277e734514ab12e3f1330a904f42d
-
Size
392KB
-
MD5
65883b34f9df7648add00a9f66e50a2c
-
SHA1
9eb50c6f400a0592cd99e7400bf2d75df5f15082
-
SHA256
57b2fd7a461e836d567ed6a94b25b2b66e1277e734514ab12e3f1330a904f42d
-
SHA512
190114f5d4eca5d0f7aedc953e51c9722599fac7db44acfdd6b639a6a88021f0b90e3947711c925557ce540844c8fc354d70f52d892b11526e6c51a91f9a4e2d
-
SSDEEP
12288:1FRMaHEAJLjpFv6w2K/PkFtlVMHFWg1EOfoMzCc3Sa0n:/RMakAJLjpFvN/ytkjEOfoMWN
Malware Config
Signatures
Files
-
57b2fd7a461e836d567ed6a94b25b2b66e1277e734514ab12e3f1330a904f42d.exe windows x86
fcbb7a6c6ce69b692734d829d85b5e37
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
FindAtomA
IsBadStringPtrW
LoadLibraryW
ReleaseMutex
InitializeCriticalSection
GetFileTime
GetCurrentProcessId
GetCurrentThreadId
ReleaseMutex
GetDriveTypeA
GetEnvironmentVariableW
GetPrivateProfileStringA
CreateEventW
GlobalFlags
lstrlenW
FindClose
HeapCreate
TlsGetValue
WriteFile
user32
CallWindowProcW
DrawTextA
GetClientRect
GetKeyboardType
EndDialog
DrawStateW
SetFocus
GetSysColor
DispatchMessageA
CreateWindowExA
IsWindow
GetSysColor
GetClassInfoA
rastapi
DeviceDone
DeviceDone
DeviceDone
DeviceDone
DeviceDone
cryptui
LocalEnroll
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 404KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 381KB - Virtual size: 380KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ