Static task
static1
Behavioral task
behavioral1
Sample
3c3093487ddd90f4729052fba96e0fd4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3c3093487ddd90f4729052fba96e0fd4.exe
Resource
win10v2004-20220812-en
General
-
Target
3c3093487ddd90f4729052fba96e0fd4.exe
-
Size
3.0MB
-
MD5
3c3093487ddd90f4729052fba96e0fd4
-
SHA1
b40d47fa54da990934dd700d90cafd4178b8f8d2
-
SHA256
43b42cad4771b56544b6cda083120a004b5dff6700698a864e7624081ae27037
-
SHA512
dff94ce52e5a3ab5b30b6df44090e8c41dba6a8032d26fc7af5165a5e6fe74d110b2fcaef96ec5ba9cc5b0664880200b2d09804c574f9f9bda28a817533cc887
-
SSDEEP
49152:pBJzV9iav5Qix+dmCGWpR3GY8oEoDJdo4QrhhbrXB61:pBJzLZxz+dNR2/6gbp
Malware Config
Signatures
Files
-
3c3093487ddd90f4729052fba96e0fd4.exe.exe windows x86
140094f13383e9ae168c4b35b6af3356
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
ExitProcess
GetComputerNameA
GetModuleFileNameA
GetModuleHandleW
GetProcAddress
SetErrorMode
Sleep
VirtualAllocExNuma
shlwapi
PathFindFileNameA
msvcrt
malloc
free
memset
strcmp
_strcmpi
strcpy
Sections
.text Size: 3.0MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 508B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 792B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ