Static task
static1
Behavioral task
behavioral1
Sample
ea0d1952aba0c38d50ca5aa8704d997941419e11892c7db0ed7c8f7837424be5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ea0d1952aba0c38d50ca5aa8704d997941419e11892c7db0ed7c8f7837424be5.exe
Resource
win10v2004-20221111-en
General
-
Target
ea0d1952aba0c38d50ca5aa8704d997941419e11892c7db0ed7c8f7837424be5
-
Size
75KB
-
MD5
24f594b7cc19728577cd400d596a7f16
-
SHA1
46b32db5812e3cc59829dc4550f6a41526fbccca
-
SHA256
ea0d1952aba0c38d50ca5aa8704d997941419e11892c7db0ed7c8f7837424be5
-
SHA512
6ddf8b5419e2aa080926bf82aa2b940f292d9e5439fb728fcbb3b38d044be615a3db034b6a1adfbfd76742715d0b62d6c016ee711f854fb09649f5c3ad714110
-
SSDEEP
1536:rYxsxRI6mwtCVwvNKH2h7b3wMjc7Ti+GMysDW:rYxsrIitg7WhHwx7TtG5sD
Malware Config
Signatures
Files
-
ea0d1952aba0c38d50ca5aa8704d997941419e11892c7db0ed7c8f7837424be5.exe windows x86
45a93aa697ca2d88c83465fdcd27e19e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiW
CreateFileA
GetTickCount
GetCommandLineW
GetDiskFreeSpaceW
ResumeThread
GetModuleHandleA
HeapCreate
CloseHandle
CreateThread
GetFileAttributesW
FindAtomW
LocalFree
GetComputerNameA
SetLastError
SetEvent
GetSystemTime
ReleaseMutex
LoadLibraryW
ResetEvent
user32
DestroyCaret
CallWindowProcA
CloseWindow
DrawStateA
DispatchMessageA
GetClipCursor
SetFocus
CreateWindowExA
FillRect
GetKeyState
GetClassInfoA
GetComboBoxInfo
GetDlgItem
MessageBoxA
cryptdlg
CertTrustCertPolicy
CertTrustInit
DecodeRecipientID
CertTrustFinalPolicy
CertConfigureTrustA
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE