Static task
static1
Behavioral task
behavioral1
Sample
c65243bd0c187085940faa246de3fa6a9c50e81588e06abce4ae528f6bf90912.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c65243bd0c187085940faa246de3fa6a9c50e81588e06abce4ae528f6bf90912.exe
Resource
win10v2004-20220901-en
General
-
Target
c65243bd0c187085940faa246de3fa6a9c50e81588e06abce4ae528f6bf90912
-
Size
396KB
-
MD5
6dfccedca43e87537d9f8054b218a582
-
SHA1
45ea26e56af54ec4db25b340f52f707055e9b0c0
-
SHA256
c65243bd0c187085940faa246de3fa6a9c50e81588e06abce4ae528f6bf90912
-
SHA512
8a6e3bc1e13ea1d2d97e52ee675ffbee506a473d9099a6f7577a1e34096e71dff62459308523b9e4c09448d8ee4a80617d29c4f316d3eb2804630561d1192731
-
SSDEEP
6144:IyUqol32GmCwt3Ncm1pR2tVAdNqDMYD6k6F1+B8yzxmnvwlKfHHl:IyUbdA3NcGutVAdEDMFhFeEnvwSF
Malware Config
Signatures
Files
-
c65243bd0c187085940faa246de3fa6a9c50e81588e06abce4ae528f6bf90912.exe windows x86
c7b1473e33988bc4c1b46a42110c87e5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
CreateFileW
GlobalUnlock
LoadLibraryW
CloseHandle
CreateThread
lstrcpyA
GetModuleHandleA
GetTickCount
UnmapViewOfFile
PulseEvent
GetSystemTime
Sleep
HeapCreate
GetComputerNameA
GetCurrentDirectoryA
GetCommandLineW
ResetEvent
LocalFree
lstrlenA
user32
FillRect
DispatchMessageA
SetFocus
IsWindow
GetDC
CallWindowProcA
GetKeyState
CheckRadioButton
DrawEdge
GetDlgItem
DrawMenuBar
GetScrollBarInfo
CreateWindowExA
cryptui
WizardFree
CryptUIDlgSelectStoreA
CryptUIDlgCertMgr
CryptUIDlgSelectCA
LocalEnroll
timedate.cpl
CPlApplet
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 396KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 371KB - Virtual size: 372KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ