Static task
static1
Behavioral task
behavioral1
Sample
3a36ef2dd99883b2f5dd0a348a9813a8874989e91b4fc45aec221c7650425bb3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3a36ef2dd99883b2f5dd0a348a9813a8874989e91b4fc45aec221c7650425bb3.exe
Resource
win10v2004-20220812-en
General
-
Target
3a36ef2dd99883b2f5dd0a348a9813a8874989e91b4fc45aec221c7650425bb3
-
Size
9KB
-
MD5
75a08b346c2f08c5d7cb2dfadcf30e4f
-
SHA1
f04ff982c21c0d7a2a624dd371b87b1560fa668a
-
SHA256
3a36ef2dd99883b2f5dd0a348a9813a8874989e91b4fc45aec221c7650425bb3
-
SHA512
21201ebf99205defa4a5156fad2e84ae0241c2050a3c7e6d4a699043a1583935c8871dff6bc994d3df317bf8b62d9d307d29aa79c7a654e8389984b07e3777dd
-
SSDEEP
192:zpJt5dW6sofkP2uXmjEmd0iQprm2NnKY:FX7fkuuG2icjVKY
Malware Config
Signatures
Files
-
3a36ef2dd99883b2f5dd0a348a9813a8874989e91b4fc45aec221c7650425bb3.exe windows x86
258cddaa7e511d69c2b58cb4d508ef62
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
kernel32
HeapAlloc
GetProcessHeap
HeapFree
CloseHandle
DeviceIoControl
CreateFileA
CreateProcessA
WriteFile
GetTempFileNameA
GetTempPathA
ResumeThread
SetThreadContext
WriteProcessMemory
VirtualAllocEx
ReadProcessMemory
GetThreadContext
CreateProcessW
lstrcatW
GetEnvironmentVariableW
CreateEventA
UnmapViewOfFile
VirtualQuery
MapViewOfFile
OpenFileMappingA
QueryPerformanceCounter
CreateMutexA
ReleaseMutex
TerminateProcess
Sleep
WaitForSingleObject
OpenEventA
user32
wsprintfA
wsock32
closesocket
recv
send
connect
htons
socket
WSACleanup
WSAStartup
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 608B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 298B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ