Static task
static1
Behavioral task
behavioral1
Sample
c130904e0838c83f060e514d121d19e2e57baa46c501797bf343699b1b276e7a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c130904e0838c83f060e514d121d19e2e57baa46c501797bf343699b1b276e7a.exe
Resource
win10v2004-20220812-en
General
-
Target
c130904e0838c83f060e514d121d19e2e57baa46c501797bf343699b1b276e7a
-
Size
299KB
-
MD5
dd86494488c318d27c9e49e8adafa575
-
SHA1
7a9fba7dc432e404485a0f8f7e7c3318e14d39fa
-
SHA256
c130904e0838c83f060e514d121d19e2e57baa46c501797bf343699b1b276e7a
-
SHA512
361798329e2dff478645f74f8cdbb1537088a61a1fa107281042521e87e3535b3dc3b87dc0b6987b37ed3fadac0774031cf3a90bd891a71feec7a0f87d06aef6
-
SSDEEP
6144:kAEqj2b5gaFKc6x3qpyDJTa9hRrvRmM/rmvQdgMLE2GXHlUTkgnXE:kw21gtPDJTChRwM/iygMovHlnw
Malware Config
Signatures
Files
-
c130904e0838c83f060e514d121d19e2e57baa46c501797bf343699b1b276e7a.exe windows x86
a8b269b6415255ccafff054ed3df9208
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryExW
GetCurrentDirectoryA
GetTimeFormatA
GetComputerNameA
GetModuleHandleA
SetLastError
GetCommandLineW
CreateThread
GetSystemTime
Sleep
SetEvent
lstrlenA
FindVolumeClose
HeapCreate
GetTickCount
LocalFree
LocalUnlock
CreateFileA
UnmapViewOfFile
CloseHandle
user32
SetFocus
DrawEdge
DispatchMessageA
DrawMenuBar
IsWindow
CreateWindowExA
CallWindowProcA
CheckRadioButton
GetDlgItem
FillRect
GetComboBoxInfo
GetDC
GetKeyState
cryptui
CryptUIDlgSelectStoreA
CryptUIDlgCertMgr
WizardFree
CryptUIDlgSelectCA
LocalEnroll
inetcpl.cpl
OpenFontsDialog
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 628KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ