Static task
static1
Behavioral task
behavioral1
Sample
afc3c6db2aa9529c5d9df863952ceb61f5b79d35d8ede5cbee8c0732ebd6e23c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
afc3c6db2aa9529c5d9df863952ceb61f5b79d35d8ede5cbee8c0732ebd6e23c.exe
Resource
win10v2004-20220901-en
General
-
Target
afc3c6db2aa9529c5d9df863952ceb61f5b79d35d8ede5cbee8c0732ebd6e23c
-
Size
75KB
-
MD5
7df51804500b56b7869d7e00635cf069
-
SHA1
9316794d33b7d03ac3cd1fc9835791f10e49bad1
-
SHA256
afc3c6db2aa9529c5d9df863952ceb61f5b79d35d8ede5cbee8c0732ebd6e23c
-
SHA512
b709a8950ad5da4f292deff58ca8da6ee8f63661fe4f4ce12561f5e635ca7ff185f5fcf7fd44c0a16e17ca11b8594e80f5fb5a24ff4334387fa30fb48b98ea35
-
SSDEEP
1536:eaHou8wtCVwvNKH2hjH3ww3EphhSJ0FBc:eaIu9tg7Whz3ww3E7MJUB
Malware Config
Signatures
Files
-
afc3c6db2aa9529c5d9df863952ceb61f5b79d35d8ede5cbee8c0732ebd6e23c.exe windows x86
3a53608e1170affeb15006476e7975c6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
CreateThread
GetComputerNameA
GetTickCount
GetSystemTime
GetFileAttributesW
GetDiskFreeSpaceW
GetCommandLineW
ResumeThread
lstrcmpiW
ResetEvent
SetEvent
ReleaseMutex
HeapCreate
FindAtomW
GetModuleHandleA
LocalFree
CloseHandle
LoadLibraryW
CreateFileA
user32
CreateWindowExA
SetFocus
DispatchMessageA
CloseWindow
FillRect
GetClipCursor
GetClassInfoA
CallWindowProcA
GetComboBoxInfo
DestroyCaret
DrawStateA
GetDlgItem
GetKeyState
MessageBoxA
cryptdlg
CertTrustInit
CertTrustFinalPolicy
CertConfigureTrustA
CertTrustCertPolicy
DecodeRecipientID
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE