Static task
static1
Behavioral task
behavioral1
Sample
c42106f862852d6ced8de9e4aa72dedd6d3493009e677e7d3fce0a8c4d3397a1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c42106f862852d6ced8de9e4aa72dedd6d3493009e677e7d3fce0a8c4d3397a1.exe
Resource
win10v2004-20221111-en
General
-
Target
c42106f862852d6ced8de9e4aa72dedd6d3493009e677e7d3fce0a8c4d3397a1
-
Size
122KB
-
MD5
8a1f1ce163b7d47f14d8636a35424984
-
SHA1
14246637b457d08b2f39d209311f0bf76f750513
-
SHA256
c42106f862852d6ced8de9e4aa72dedd6d3493009e677e7d3fce0a8c4d3397a1
-
SHA512
da6510be59f894940f789222a94d79a9ee9087d813c2ec0ede287be92fcf3255c3811753968e2e7010f35f166edd3ce941b2dcdfaa01ffd6fbe1480b9c7bcdae
-
SSDEEP
3072:P4yAq7mQwfPpz2S3xv9noIPOf7ICcIVI:PJ7Sh6Gx1oISItL
Malware Config
Signatures
Files
-
c42106f862852d6ced8de9e4aa72dedd6d3493009e677e7d3fce0a8c4d3397a1.exe windows x86
911d50972394c0f39a26a0fdaf637612
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
CreateFileA
SetLastError
lstrcmpiW
GetModuleHandleA
GetCommandLineW
GetComputerNameA
HeapCreate
GetTickCount
SetEvent
CloseHandle
LocalFree
GetDiskFreeSpaceW
LoadLibraryW
ReleaseMutex
GetSystemTime
GetFileAttributesW
ResumeThread
ResetEvent
FindAtomW
user32
CreateWindowExA
FillRect
DrawStateA
GetClassInfoA
GetKeyState
CloseWindow
DestroyCaret
GetClipCursor
DispatchMessageA
SetFocus
GetDlgItem
GetComboBoxInfo
CallWindowProcA
MessageBoxA
cryptdlg
CertTrustCertPolicy
CertTrustInit
CertTrustFinalPolicy
CertConfigureTrustA
DecodeRecipientID
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 109KB - Virtual size: 137KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE