Static task
static1
Behavioral task
behavioral1
Sample
c0f7e37b8c226b36d2fac2763137e3dcef87041673f86a7b4fe4176a8ef73ac8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c0f7e37b8c226b36d2fac2763137e3dcef87041673f86a7b4fe4176a8ef73ac8.exe
Resource
win10v2004-20220812-en
General
-
Target
c0f7e37b8c226b36d2fac2763137e3dcef87041673f86a7b4fe4176a8ef73ac8
-
Size
92KB
-
MD5
ca82082a8915df3c29d53dd09c932615
-
SHA1
43a3ebe94744d416cc6e85c86e2988be6a6a3223
-
SHA256
c0f7e37b8c226b36d2fac2763137e3dcef87041673f86a7b4fe4176a8ef73ac8
-
SHA512
22eebd6d5abda423f92ea64216581238fef693f4f803fd456f0b96d4860b0fbf9c028d78a61c14aecdacadd630590b33c94ec7e76a27c3851cdf69d111a002d8
-
SSDEEP
1536:0YE6X9D8sMMOPAoKu/avRefffffIxqQ0nu8Sne31F8Jjq19hFJjUCS53Oq:0ti90pPAoK60RpxqQ0nSe31F8ZqhTjUS
Malware Config
Signatures
Files
-
c0f7e37b8c226b36d2fac2763137e3dcef87041673f86a7b4fe4176a8ef73ac8.exe windows x86
fa85327a2e2f953933f22880e30fa898
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryExW
FindResourceW
GetCurrentThreadId
CloseHandle
HeapCreate
PulseEvent
lstrlenA
Sleep
FindClose
GetCommandLineA
lstrcpyA
UnmapViewOfFile
GetModuleHandleA
LocalFree
SetLastError
GetComputerNameA
GetCurrentDirectoryA
CreateProcessA
GlobalUnlock
CreateFileW
user32
IsWindow
DrawMenuBar
DispatchMessageA
CheckRadioButton
CreateIcon
GetDC
DrawEdge
GetCaretPos
SetFocus
GetDlgItem
FillRect
CallWindowProcA
CreateWindowExA
rsaenh
CPGenKey
CPHashData
CPDecrypt
CPDeriveKey
CPSignHash
msasn1
ASN1BERDecEoid
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 50KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE