Static task
static1
Behavioral task
behavioral1
Sample
39010b3d6812ae81bde2f06d1ca3a9f7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
39010b3d6812ae81bde2f06d1ca3a9f7.exe
Resource
win10v2004-20220812-en
General
-
Target
39010b3d6812ae81bde2f06d1ca3a9f7.exe
-
Size
169KB
-
MD5
39010b3d6812ae81bde2f06d1ca3a9f7
-
SHA1
d39493af9f61b7aa87910b4671365177373f525f
-
SHA256
b86d507cca3de74cc75354f0972e61f5d6e4b80bceaa1e4d702e3b616a305f13
-
SHA512
0177729a7c4a625f8c50d5c92a238e7e95259dd2cf83c7a08e008ea1742cbd75ed00f58489b33afc28bbbb3e667a58597da0cfdcf9ab6c9b7eefd8e083760520
-
SSDEEP
3072:zMAJLKJN5ryZVbxVGUcZe+0TWJxSWrBh/PkWDn:YOL6rQBcZe+s
Malware Config
Signatures
Files
-
39010b3d6812ae81bde2f06d1ca3a9f7.exe.exe windows x86
421101026430183dbdae7b6074c76658
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileIntW
InterlockedDecrement
GetSystemTimeAdjustment
VerSetConditionMask
SetLocaleInfoW
FindNextVolumeW
FindNextChangeNotification
CopyFileExW
MoveFileWithProgressW
GetProfileSectionA
VerifyVersionInfoW
LocalFlags
GetProcessPriorityBoost
FindFirstChangeNotificationW
GlobalGetAtomNameW
GetComputerNameExA
FindResourceExA
GetComputerNameExW
GetModuleHandleA
GetTempPathW
BuildCommDCBAndTimeoutsW
GetProcAddress
LoadLibraryA
ExitProcess
HeapAlloc
InitializeCriticalSection
EnumSystemLocalesA
DisableThreadLibraryCalls
OpenMutexA
SystemTimeToFileTime
GetProcessShutdownParameters
FindResourceW
VerifyVersionInfoA
GetOverlappedResult
DeleteFiber
EnumDateFormatsA
VirtualQuery
GetVolumeNameForVolumeMountPointA
FatalAppExitA
ProcessIdToSessionId
SetConsoleCursorPosition
GetComputerNameA
VirtualUnlock
GetCurrencyFormatA
GetTapeParameters
GetPrivateProfileStructW
GetAtomNameW
FlushConsoleInputBuffer
SetProcessAffinityMask
GetCPInfoExW
SetThreadContext
lstrlenW
SetConsoleCtrlHandler
QueryInformationJobObject
lstrcpynA
WriteConsoleW
GetBinaryTypeW
GetProfileSectionW
SearchPathA
GetCommandLineW
GetCalendarInfoW
GetConsoleTitleW
CreateActCtxA
FormatMessageW
GetModuleHandleW
GetConsoleAliasA
InterlockedIncrement
LoadLibraryW
FindActCtxSectionGuid
SetConsoleCursorInfo
RegisterWaitForSingleObject
InterlockedExchange
GlobalAlloc
GetFileType
SetLastError
SetProcessPriorityBoost
SetMailslotInfo
GetSystemDefaultUILanguage
GetConsoleMode
GetLastError
DeleteFileA
GetStartupInfoW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
Sleep
WriteFile
GetStdHandle
GetModuleFileNameA
SetUnhandledExceptionFilter
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
RtlUnwind
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
user32
CharUpperW
Sections
.text Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ