Static task
static1
Behavioral task
behavioral1
Sample
c4797cb7161b076a460f67124862ab1f8baf6cb2ef6c2f442689e73a69c5f318.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c4797cb7161b076a460f67124862ab1f8baf6cb2ef6c2f442689e73a69c5f318.exe
Resource
win10v2004-20220901-en
General
-
Target
c4797cb7161b076a460f67124862ab1f8baf6cb2ef6c2f442689e73a69c5f318
-
Size
499KB
-
MD5
917571ca6a2c80a6fd40648ebc3f69f5
-
SHA1
5064622b6b763e14df59de5baa867dd2a0671cb0
-
SHA256
c4797cb7161b076a460f67124862ab1f8baf6cb2ef6c2f442689e73a69c5f318
-
SHA512
f82df94294a050ae46bda6e811d54892faa6a6c188dec310e0d1f52bef19afaaff1b3f50a5081865226af0b3afa067d9e7f1cbf1612bbc847cce3194a04696b4
-
SSDEEP
6144:GhvkZ8gulzV2V9/H5DTwaHd6dcNiXPnpUTJPyd+MElqwkp7:IMZu2z96dcYXPnpcJPydjZ
Malware Config
Signatures
Files
-
c4797cb7161b076a460f67124862ab1f8baf6cb2ef6c2f442689e73a69c5f318.exe windows x86
c2e51d00555b34986abd2897172ad8ad
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SuspendThread
PulseEvent
Sleep
HeapCreate
IsBadStringPtrA
ReleaseMutex
GetFileAttributesA
lstrlenA
IsDebuggerPresent
CreateFileA
CreateFileMappingA
GetDriveTypeA
DeleteFileA
GetModuleHandleA
GetStartupInfoA
GetACP
DeviceIoControl
TlsAlloc
TlsGetValue
GetModuleFileNameW
user32
DispatchMessageA
DestroyMenu
IsZoomed
DispatchMessageA
PeekMessageA
GetWindowLongA
DrawTextW
CallWindowProcW
FindWindowW
LoadImageA
GetIconInfo
DestroyWindow
IsWindow
asycfilt
FilterCreateInstance
FilterCreateInstance
FilterCreateInstance
FilterCreateInstance
cryptui
WizardFree
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 408KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 491KB - Virtual size: 490KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ