Static task
static1
Behavioral task
behavioral1
Sample
af804b023112bb3c90581a699c7bc03f1bee64c0343f2b1cabaf4685113a17b2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
af804b023112bb3c90581a699c7bc03f1bee64c0343f2b1cabaf4685113a17b2.exe
Resource
win10v2004-20220812-en
General
-
Target
af804b023112bb3c90581a699c7bc03f1bee64c0343f2b1cabaf4685113a17b2
-
Size
72KB
-
MD5
c7075cc9b2410c462900c0d183bb7feb
-
SHA1
404901ecf9dbb51b25571bd2b8861418bc009b43
-
SHA256
af804b023112bb3c90581a699c7bc03f1bee64c0343f2b1cabaf4685113a17b2
-
SHA512
c34055eefa222c93a8ff13362e68a31999c9f2848c8d468226b09fa13983845a9f759f5769067214f1f65583c3eb57c125511c21f1b2a17999d00c1f99272a85
-
SSDEEP
1536:Gmb5Rf2GGUPMWLpbQ/UTO7bD7kz2sTdK7h+:shUrccYD7MTd4h+
Malware Config
Signatures
Files
-
af804b023112bb3c90581a699c7bc03f1bee64c0343f2b1cabaf4685113a17b2.exe windows x86
c845aa8adfd876d2c91192a47e902163
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileTime
lstrlenW
GetPrivateProfileStringA
WriteFile
GetCurrentProcessId
GetDriveTypeA
ReleaseMutex
FindAtomA
GlobalFlags
FindClose
CreateEventW
GetCurrentThreadId
GetEnvironmentVariableW
TlsGetValue
ReleaseMutex
HeapCreate
LocalFree
InitializeCriticalSection
IsBadStringPtrW
LoadLibraryW
user32
GetSysColor
GetSysColor
CreateWindowExA
GetClassInfoA
IsWindow
EndDialog
CallWindowProcW
GetKeyboardType
SetFocus
DrawTextA
GetClientRect
DrawStateW
DispatchMessageA
rastapi
DeviceDone
DeviceDone
DeviceDone
DeviceDone
DeviceDone
clbcatq
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hwrtumm Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE