Static task
static1
Behavioral task
behavioral1
Sample
a250ae6c87fe07c2b97434796919e80654c17fd69c4f5a5167bdbf94fb482529.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a250ae6c87fe07c2b97434796919e80654c17fd69c4f5a5167bdbf94fb482529.exe
Resource
win10v2004-20220812-en
General
-
Target
a250ae6c87fe07c2b97434796919e80654c17fd69c4f5a5167bdbf94fb482529
-
Size
498KB
-
MD5
c35f57029ddfcc37da3102cf2bf9b970
-
SHA1
9f993585de0d6901980c771da6ab9ca56b2598dc
-
SHA256
a250ae6c87fe07c2b97434796919e80654c17fd69c4f5a5167bdbf94fb482529
-
SHA512
e2bb2cd00af3d675e86189814fbc85ccd99f7ea08b2fb4cdad74dd2f958d47b79a947ca1a38f1770d21bad12d1ab33901c9af44ccbf62c54e0a846bd5a97aa84
-
SSDEEP
6144:pe9QkPvy/KD5bVg05M/PZ+B+bHRJpEvlTZlG5KyLcRMCts+Yl8Zjkfj:2ViCDVk/PI89J2tTANj+Yljb
Malware Config
Signatures
Files
-
a250ae6c87fe07c2b97434796919e80654c17fd69c4f5a5167bdbf94fb482529.exe windows x86
c8ed576e02a32dbc02c58e72922b5e0f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SuspendThread
GetFileAttributesA
PulseEvent
GetModuleHandleA
TlsAlloc
IsBadStringPtrW
lstrlenA
DeleteFileA
TlsGetValue
IsDebuggerPresent
CreateFileA
GetCommandLineA
ReleaseMutex
HeapCreate
Sleep
GetDriveTypeA
GetModuleFileNameW
CreateFileMappingA
GetStartupInfoA
DeviceIoControl
user32
DestroyWindow
LoadImageA
DispatchMessageA
CallWindowProcW
FindWindowW
DestroyMenu
GetIconInfo
IsZoomed
PeekMessageA
DispatchMessageA
GetWindowLongA
IsWindow
DrawTextW
cliconfg
OnInitDialogMain
OnInitDialogMain
OnInitDialogMain
OnInitDialogMain
cryptui
CryptUIDlgCertMgr
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 408KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 491KB - Virtual size: 490KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ