Static task
static1
Behavioral task
behavioral1
Sample
3df5b9962ff9ccff2797236e073991cdf9a6b04dfaad28a908d5dcd17afa21e6.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
3df5b9962ff9ccff2797236e073991cdf9a6b04dfaad28a908d5dcd17afa21e6.exe
Resource
win10v2004-20220331-en
General
-
Target
3df5b9962ff9ccff2797236e073991cdf9a6b04dfaad28a908d5dcd17afa21e6
-
Size
539KB
-
MD5
29977a4237c7d10a0f09adb24540609c
-
SHA1
330e45a0e9b32bad06831963bd46579458a5ec8d
-
SHA256
3df5b9962ff9ccff2797236e073991cdf9a6b04dfaad28a908d5dcd17afa21e6
-
SHA512
cd2c9b99c96be0e364a055343440618641aafa2cfedc6eef287ebeba3f204c9cf1d043643bbdd316f6c5b3e29de75189b4731e01d7719823d63e3bc0e666e48e
Malware Config
Signatures
Files
-
3df5b9962ff9ccff2797236e073991cdf9a6b04dfaad28a908d5dcd17afa21e6.exe windows x86
cfcf3856ed103a2125b94548c1da351d
Code Sign
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
WaitForSingleObject
CreateEventA
GetCurrentProcess
GetSystemTime
GetLocalTime
VirtualAllocEx
SystemTimeToFileTime
GetDateFormatA
GetDateFormatEx
MultiByteToWideChar
WideCharToMultiByte
CloseHandle
ReadFile
SetEndOfFile
CreateFileW
GetStringTypeW
OutputDebugStringW
WriteConsoleW
SetFilePointerEx
FlushFileBuffers
SetStdHandle
HeapReAlloc
GetCPInfo
GetTempPathW
GetTempFileNameW
GetFileSizeEx
FindVolumeClose
FindNextVolumeW
FindNextFileW
FindFirstVolumeW
FindFirstFileW
FindClose
CompareFileTime
GetSystemDefaultLangID
GetStdHandle
GetOEMCP
GetACP
IsValidCodePage
LoadLibraryExW
FreeLibrary
FatalAppExitA
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetCommandLineA
IsProcessorFeaturePresent
HeapAlloc
HeapFree
ExitProcess
GetModuleHandleExW
GetProcAddress
AreFileApisANSI
HeapSize
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
WriteFile
GetConsoleCP
GetConsoleMode
SetLastError
GetCurrentThread
GetCurrentThreadId
GetProcessHeap
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetTickCount
GetModuleHandleW
CreateSemaphoreW
SetConsoleCtrlHandler
GetDateFormatW
GetTimeFormatW
CompareStringW
ReadConsoleW
user32
GetClipboardFormatNameA
SendMessageA
EnumWindowStationsA
GetAncestor
GetShellWindow
GetCursorPos
GetWindowTextA
GetForegroundWindow
UpdateWindow
GetSystemMetrics
advapi32
GetNamedSecurityInfoA
ImpersonateLoggedOnUser
ImpersonateAnonymousToken
GetTokenInformation
GetSidSubAuthorityCount
GetSidLengthRequired
GetSidIdentifierAuthority
GetLengthSid
GetAclInformation
DuplicateToken
ConvertStringSidToSidA
shell32
SHBindToParent
SHGetFolderLocation
ole32
CoInitialize
oleaut32
SysAllocStringLen
VariantChangeType
VariantInit
dwmapi
ord102
Sections
.text Size: 228KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 261KB - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ