Static task
static1
Behavioral task
behavioral1
Sample
3d3df3e7eb70a5b2ec5d8484b65aa13b0bfa15161ad29b1435f17fc7c80cdef9.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3d3df3e7eb70a5b2ec5d8484b65aa13b0bfa15161ad29b1435f17fc7c80cdef9.exe
Resource
win10v2004-20220414-en
General
-
Target
3d3df3e7eb70a5b2ec5d8484b65aa13b0bfa15161ad29b1435f17fc7c80cdef9
-
Size
1.1MB
-
MD5
bba54c282b52450d29c0372a0d0801ea
-
SHA1
670981a5ef11461aa1891ab300c41f7e83c4e64d
-
SHA256
3d3df3e7eb70a5b2ec5d8484b65aa13b0bfa15161ad29b1435f17fc7c80cdef9
-
SHA512
056cba65bbaf1aaa7f9a3d548dd6b958e562cd4e3be5e91b1998c3d998f5197a241b7bf8da8470743962d902153b6cfbf2239e18b7bacdd6f30ecae248e71c5d
-
SSDEEP
24576:qn4qZ9kMnVFb91WNZj2GdNiZ5SfkVEmLq9kqRn:q4qZyQVx0Zj2Ge2S3O9DRn
Malware Config
Signatures
Files
-
3d3df3e7eb70a5b2ec5d8484b65aa13b0bfa15161ad29b1435f17fc7c80cdef9.exe windows x86
cab484a112ec1288b26149e8a56b39ef
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetDriveTypeA
GlobalAlloc
VirtualFreeEx
LoadLibraryW
_hread
GetSystemPowerStatus
LeaveCriticalSection
GetFileAttributesA
GetNamedPipeInfo
FindNextVolumeW
GetBinaryTypeA
ReadFile
CreateFileW
CreateActCtxA
lstrlenW
SetConsoleTitleA
FlushInstructionCache
GlobalUnfix
FormatMessageA
ReadConsoleOutputCharacterA
GetProcAddress
PeekConsoleInputW
GetLocalTime
GetAtomNameA
SetThreadPriorityBoost
LocalAlloc
GetCommMask
SetCommMask
SetLocaleInfoW
CompareStringA
OutputDebugStringA
GetCPInfoExA
DeleteFileW
lstrcpyW
GetStringTypeW
WriteConsoleW
GetModuleHandleW
SleepEx
GetNamedPipeHandleStateA
SetConsoleActiveScreenBuffer
SetMailslotInfo
VerSetConditionMask
SetConsoleTextAttribute
LoadResource
MoveFileExA
SetComputerNameExA
GetLocaleInfoA
GetNativeSystemInfo
RemoveVectoredExceptionHandler
GetProfileIntA
ExitProcess
EncodePointer
DecodePointer
GetCommandLineW
RaiseException
RtlUnwind
IsProcessorFeaturePresent
IsDebuggerPresent
EnterCriticalSection
GetLastError
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapSize
GetConsoleMode
ReadConsoleW
HeapFree
CloseHandle
HeapAlloc
SetLastError
GetCurrentThreadId
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetConsoleCP
SetFilePointerEx
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
LoadLibraryExW
HeapReAlloc
SetStdHandle
LCMapStringW
FlushFileBuffers
OutputDebugStringW
SetEndOfFile
user32
GetMessageExtraInfo
advapi32
BackupEventLogW
SetFileSecurityA
AddAce
FreeSid
RegReplaceKeyA
ObjectCloseAuditAlarmA
SetSecurityDescriptorOwner
CreatePrivateObjectSecurity
RegQueryMultipleValuesA
GetSecurityDescriptorControl
StartServiceCtrlDispatcherW
OpenProcessToken
OpenServiceA
AddAccessDeniedAceEx
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.0MB - Virtual size: 117.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ