Static task
static1
Behavioral task
behavioral1
Sample
a3799b20.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a3799b20.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
e9834723.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
e9834723.exe
Resource
win10v2004-20220812-en
General
-
Target
021fcdfd41a0c5ae9f4bf4d972819a7c85a31e036544d88247d42d794593beef
-
Size
82KB
-
MD5
27a514a264cf0188c1486f188d8bbab1
-
SHA1
1d0dd38e82eb3067f13bb9045bf0b0aa858254ce
-
SHA256
021fcdfd41a0c5ae9f4bf4d972819a7c85a31e036544d88247d42d794593beef
-
SHA512
3d5ce5d7e608da734c84444eb78698f0e26ee436ee0083b74e861890dbe725e38733a8ccefc2d3924daea29d247ff78d4b364c8d4aa0dba7f578b874722eead9
-
SSDEEP
1536:mLYTqRoDnpMediXo4K9wWdqwVfbVe+n9p2Y2ymg6D1jgpagrc:mmyoDcXITdqw7P6D1jDwc
Malware Config
Signatures
Files
-
021fcdfd41a0c5ae9f4bf4d972819a7c85a31e036544d88247d42d794593beef.cab
-
a3799b20.exe.exe windows x86
d1f9ae15289bf789d077344e3f5bf051
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetModuleHandleW
ExitProcess
GetEnvironmentVariableA
VirtualAllocEx
GetExitCodeThread
GetModuleHandleA
IsBadStringPtrW
GetLastError
EnumResourceLanguagesA
GetNamedPipeHandleStateA
MapViewOfFileEx
VirtualAlloc
GetNamedPipeInfo
GetStartupInfoA
VirtualProtect
OutputDebugStringA
msvcrt
_ismbbgraph
_adj_fdiv_r
_chmod
_mbsnbset
_mbsnbcmp
raise
??1bad_cast@@UAE@XZ
memcpy
putwchar
ftell
_open_osfhandle
_abnormal_termination
_set_error_mode
_CIatan
_CIlog
?set_new_handler@@YAP6AXXZP6AXXZ@Z
_ismbcprint
fread
malloc
__wargv
user32
TrackPopupMenu
GetWindowRect
LoadAcceleratorsW
OpenDesktopA
AppendMenuW
MapWindowPoints
ModifyMenuA
SetForegroundWindow
GetSystemMetrics
LoadStringA
GetClipboardData
LoadStringW
GetMonitorInfoW
SetFocus
GetMenuState
UnregisterClassA
GetDlgItemInt
DefWindowProcW
RegisterClassExW
AdjustWindowRect
GetMessageW
EndDialog
gdi32
SetBkMode
GetDIBits
GetNearestColor
GetBrushOrgEx
CreatePatternBrush
GetPaletteEntries
DeleteDC
SetTextColor
SetStretchBltMode
GetObjectW
SetBrushOrgEx
SetPixel
CreateDIBSection
SetDIBitsToDevice
GetTextFaceW
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1012B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.debug Size: 1KB - Virtual size: 1KB
IMAGE_SCN_MEM_READ
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 84B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
e9834723.exe.exe windows x86
bc6eef59efdebf05316d611d7452ca93
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHCoCreateInstance
DAD_DragLeave
DAD_DragMove
Shell_GetImageLists
DAD_DragEnterEx
DragFinish
DllInstall
IsLFNDrive
PifMgr_OpenProperties
DllGetClassObject
DuplicateIcon
DragAcceptFiles
DllRegisterServer
DllCanUnloadNow
SHDefExtractIconW
DllGetVersion
SHILCreateFromPath
kernel32
ExitProcess
GetModuleHandleA
HeapSize
SetConsoleWindowInfo
GetCurrentProcess
Sleep
LockResource
EnumResourceNamesA
LocalFree
InitializeCriticalSection
GetProcessHeap
GetProcAddress
InterlockedIncrement
GetCurrentProcessId
WriteFile
HeapAlloc
SizeofResource
FreeLibrary
SetUnhandledExceptionFilter
InterlockedDecrement
CloseHandle
SetLastError
MultiByteToWideChar
LeaveCriticalSection
TerminateProcess
GetTickCount
EnumResourceTypesA
VirtualAlloc
UnhandledExceptionFilter
GetCurrentThreadId
GetLastError
GetSystemTimeAsFileTime
EnterCriticalSection
QueryPerformanceCounter
SetConsolePalette
LoadResource
FindResourceA
LoadLibraryA
WideCharToMultiByte
EndUpdateResourceA
HeapFree
DeleteCriticalSection
FreeResource
Sections
.textbss Size: - Virtual size: 12KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.debug Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ