Static task
static1
Behavioral task
behavioral1
Sample
3539e815b40a3a6cf24937766d79fb3249693ae644c6b5a08641f195a0741ac2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3539e815b40a3a6cf24937766d79fb3249693ae644c6b5a08641f195a0741ac2.exe
Resource
win10v2004-20220812-en
General
-
Target
3539e815b40a3a6cf24937766d79fb3249693ae644c6b5a08641f195a0741ac2
-
Size
60KB
-
MD5
64529f1fed733bdc17a822d259b42190
-
SHA1
573ec1ad5c173d85fccad3bb0ce7a3d68f0db504
-
SHA256
3539e815b40a3a6cf24937766d79fb3249693ae644c6b5a08641f195a0741ac2
-
SHA512
d3d717bf1534e78435663cba361283416c8f334feaad86a9e0f0cc1973101626214c80a55873d926e91fdf45b97007db6adf50482ca80c437a1b1adc7e175aba
-
SSDEEP
1536:5RQruVClkbrWMAhUb7jwwiZNDDzA666j4zuSQ:5GruVClkbhEMjdiLDDzA36yQ
Malware Config
Signatures
Files
-
3539e815b40a3a6cf24937766d79fb3249693ae644c6b5a08641f195a0741ac2.exe windows x86
23600c1c3adbc2f909f923e83cd8b288
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetTextColor
SelectObject
GetTextMetricsA
kernel32
SetCurrentDirectoryA
FindFirstFileA
lstrlenA
GetSystemDirectoryA
SetFileTime
IsDBCSLeadByte
CreateThread
GlobalFree
HeapFree
lstrcatA
GetCurrentProcessId
GetStringTypeA
WriteFile
FreeLibrary
CreateDirectoryA
GetTickCount
GetProcAddress
lstrcpyA
GetCurrentProcessId
GetPrivateProfileStringA
_llseek
GetBinaryTypeA
lstrcpynA
ReadFile
CreateMutexA
GetDiskFreeSpaceA
ExitThread
GetTempFileNameA
GlobalAlloc
LockResource
GetShortPathNameA
QueryPerformanceCounter
GlobalUnlock
TerminateThread
GetStartupInfoA
GetCurrentThreadId
LocalFileTimeToFileTime
SetFilePointer
_lclose
CreateEventA
GetModuleHandleA
GetDriveTypeA
DosDateTimeToFileTime
CreateFileA
VDMConsoleOperation
GetTempPathA
GlobalLock
GetCurrentDirectoryA
GetVersionExA
GetFileAttributesA
UnlockFile
CreateProcessA
GetWindowsDirectoryA
FindNextFileA
ResetEvent
DeleteFileA
GetCommandLineA
GetCurrentProcess
FindClose
LoadLibraryExA
SetEvent
GetModuleFileNameA
GetSystemInfo
WritePrivateProfileStringA
ExpandEnvironmentStringsA
GetLocaleInfoW
lstrcmpiA
FormatMessageA
GetSystemTimeAsFileTime
RegisterConsoleIME
GetPrivateProfileIntA
MulDiv
_lopen
GetExitCodeProcess
lstrcmpA
EnumResourceLanguagesA
RemoveDirectoryA
WaitForSingleObject
shlwapi
PathAddBackslashA
PathGetCharTypeA
SHDeleteKeyA
PathRemoveBlanksA
PathIsRootA
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.debug Size: 44KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ