Static task
static1
Behavioral task
behavioral1
Sample
fdf7ea602b2d245a5b5fe5b4bddac6d9eaf2e6c62e46f05e9b529e096e0e2473.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fdf7ea602b2d245a5b5fe5b4bddac6d9eaf2e6c62e46f05e9b529e096e0e2473.exe
Resource
win10v2004-20221111-en
General
-
Target
fdf7ea602b2d245a5b5fe5b4bddac6d9eaf2e6c62e46f05e9b529e096e0e2473
-
Size
114KB
-
MD5
12c39edb99fdd09c6a37ac1ff61825b0
-
SHA1
5e1f37fc9a61d70f169c5bda69ec3b19f502bbd1
-
SHA256
fdf7ea602b2d245a5b5fe5b4bddac6d9eaf2e6c62e46f05e9b529e096e0e2473
-
SHA512
7a5827a5f28e23bac28055770ca9385392662d298af9f7c05d991f4110e4c02e478d6fd0056d772cc4b207f273b7c80cb2175543aa6a1280e93f7c663346b9b1
-
SSDEEP
3072:U7HI1EhwtqRbL2ws+krtztcH15KOPuqmVFk4q:U7HI1E2ybi9r8XKBqsFk4q
Malware Config
Signatures
Files
-
fdf7ea602b2d245a5b5fe5b4bddac6d9eaf2e6c62e46f05e9b529e096e0e2473.exe windows x86
13e805eaf04b241dc6563d480404e1a2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
LoadLibraryExW
lstrlenA
CreateFileW
GetCurrentThreadId
FindResourceW
PulseEvent
HeapCreate
GlobalUnlock
GetCurrentDirectoryA
LocalFree
SetLastError
Sleep
FindClose
GetModuleHandleA
CreateProcessA
GetCommandLineA
lstrcpyA
UnmapViewOfFile
GetComputerNameA
user32
FillRect
GetDlgItem
DispatchMessageA
CheckRadioButton
CallWindowProcA
CreateWindowExA
CreateIcon
DrawEdge
GetCaretPos
IsWindow
DrawMenuBar
GetDC
SetFocus
rsaenh
CPDeriveKey
CPGenKey
CPSignHash
CPDecrypt
CPHashData
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 99KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE