Static task
static1
Behavioral task
behavioral1
Sample
3cf97d4c223b880d0f5191c1c41d5303d7cb94420a172500ec2b81864647a177.exe
Resource
win7-20220223-en
Behavioral task
behavioral2
Sample
3cf97d4c223b880d0f5191c1c41d5303d7cb94420a172500ec2b81864647a177.exe
Resource
win10v2004-en-20220112
General
-
Target
3cf97d4c223b880d0f5191c1c41d5303d7cb94420a172500ec2b81864647a177
-
Size
244KB
-
MD5
35565a07ab5f0da110dc5694cccea587
-
SHA1
71532453577d0c7ef957a3c47eed5192fa9651c6
-
SHA256
3cf97d4c223b880d0f5191c1c41d5303d7cb94420a172500ec2b81864647a177
-
SHA512
36d899a706dda4b2b18ccd80d8b97f6c3e1247b9beac6bfe564f841b4f8279f11f127fb8dd8969a704c83244a1553fca32de2867576eb12793986bc67e2c20ae
Malware Config
Signatures
Files
-
3cf97d4c223b880d0f5191c1c41d5303d7cb94420a172500ec2b81864647a177.exe windows x86
6b147b3e40e743eb05e1888d625f6002
Code Sign
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
GetProcessHeap
GetModuleHandleA
ExitProcess
HeapAlloc
HeapReAlloc
HeapFree
IsBadReadPtr
WriteFile
CreateFileA
MultiByteToWideChar
WideCharToMultiByte
GetUserDefaultLCID
GetModuleFileNameA
GetTickCount
WaitForSingleObject
CreateProcessA
GetStartupInfoA
SetFilePointer
ReadFile
FindNextFileA
FindFirstFileA
FindClose
DeleteFileA
MoveFileA
RemoveDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
LCMapStringA
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
FlushFileBuffers
SetStdHandle
LCMapStringW
IsBadCodePtr
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
InterlockedIncrement
TerminateProcess
OpenProcess
lstrcpyn
GetCompressedFileSizeA
GetLogicalDriveStringsA
LocalAlloc
RtlMoveMemory
GetOEMCP
Process32Next
CloseHandle
Process32First
CreateToolhelp32Snapshot
CreateEventA
GetFileAttributesA
OpenEventA
InterlockedDecrement
GetACP
GetCPInfo
RaiseException
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetLastError
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
GetCurrentThreadId
DeleteCriticalSection
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
RtlUnwind
GetVersion
GetCommandLineA
user32
TranslateMessage
FindWindowExA
IsWindow
GetWindowThreadProcessId
GetWindowTextLengthA
GetWindowTextA
GetClassNameA
GetMessageA
wsprintfA
MessageBoxA
ExitWindowsEx
DispatchMessageA
SetWindowPos
PeekMessageA
OpenIcon
IsIconic
IsWindowVisible
advapi32
LookupPrivilegeValueA
OpenProcessToken
CryptSetKeyParam
CryptEncrypt
CryptGetKeyParam
CryptDestroyKey
CryptImportKey
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
AdjustTokenPrivileges
shlwapi
PathFileExistsA
PathFindExtensionA
PathFindFileNameA
PathIsDirectoryA
ole32
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
CoInitialize
CoUninitialize
OleRun
shell32
SHFileOperationA
oleaut32
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
SafeArrayAllocData
SafeArrayAllocDescriptor
VariantInit
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
VariantChangeType
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
VariantCopy
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
Sections
.text Size: 188KB - Virtual size: 185KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE