Static task
static1
Behavioral task
behavioral1
Sample
3c34567a28442e14ceea375642b9f39f0cb00ba239ad3081ad71e8c3d1d98dd2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3c34567a28442e14ceea375642b9f39f0cb00ba239ad3081ad71e8c3d1d98dd2.exe
Resource
win10v2004-20220812-en
General
-
Target
3c34567a28442e14ceea375642b9f39f0cb00ba239ad3081ad71e8c3d1d98dd2
-
Size
274KB
-
MD5
63b848c6da3beb220e3237f20f8c39d0
-
SHA1
91474bde32c1be247272e7532d2a24ccac128014
-
SHA256
3c34567a28442e14ceea375642b9f39f0cb00ba239ad3081ad71e8c3d1d98dd2
-
SHA512
e57e83b9e2d5c1c2b7652ede381bdf5ec2e9e23293058b7b0b95742d7737df22b5cfdfefd67bea4dbcf1dbfb833bc5f13eb4c3a92b5f251856d4b19c89dec06c
-
SSDEEP
6144:8OEgce+iH+sZvuWTEoBakFvaRHcn7IKrMj/pOtdTEi7VOVCdbnfSOZ/k70:8Ze+CDTOkFwg7IKgj/pOHERCQOZ870
Malware Config
Signatures
Files
-
3c34567a28442e14ceea375642b9f39f0cb00ba239ad3081ad71e8c3d1d98dd2.exe windows x86
a8f29cd51bcaf655e660286f12ddaa15
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_except_handler3
strncpy
sprintf
wcscpy
wcsncpy
memmove
wcschr
wcslen
free
malloc
_initterm
_adjust_fdiv
kernel32
GetTempFileNameW
LoadLibraryA
MoveFileA
GetFileAttributesA
FileTimeToDosDateTime
WideCharToMultiByte
FreeLibrary
GetProcAddress
LoadLibraryW
lstrcpyW
CloseHandle
LocalFree
SetEvent
Sleep
InterlockedExchange
InterlockedCompareExchange
GetLastError
LocalAlloc
VerifyVersionInfoW
SetFileAttributesA
CreateEventW
WaitForSingleObject
ReleaseMutex
WaitForMultipleObjects
GetTickCount
SetThreadPriority
GetCurrentThread
CreateThread
GetCurrentThreadId
SetLastError
lstrlenW
SetFileAttributesW
CreateDirectoryW
GetFileAttributesW
CompareStringW
lstrcmpiW
lstrcatW
DeleteFileW
CreateFileW
WriteFile
ReadFile
SetFileTime
MoveFileW
SetEndOfFile
GetFileSize
SetFilePointer
GetVolumeInformationW
FindClose
FindFirstFileW
MultiByteToWideChar
RaiseException
GetDriveTypeW
GetEnvironmentVariableW
OutputDebugStringA
GetDiskFreeSpaceA
lstrcatA
GetWindowsDirectoryA
GlobalFree
OutputDebugStringW
CreateMutexW
GetCurrentProcess
ProcessIdToSessionId
GetCurrentProcessId
DuplicateHandle
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InterlockedIncrement
CreateFileA
InterlockedDecrement
DeviceIoControl
DeleteFileA
lstrcpyA
user32
GetMenu
wvsprintfA
MessageBoxA
CloseDesktop
wsprintfA
wsprintfW
MsgWaitForMultipleObjects
SetThreadDesktop
UnregisterClassW
CheckMenuItem
DefWindowProcW
PostQuitMessage
DestroyWindow
advapi32
RegDeleteValueW
RegQueryValueExA
OpenThreadToken
RevertToSelf
SetThreadToken
OpenProcessToken
DuplicateToken
GetTokenInformation
RegCreateKeyExW
GetLengthSid
RegCloseKey
RegOpenKeyA
RegCreateKeyExA
GetFileSecurityW
GetUserNameA
RegOpenKeyExW
RegQueryValueExW
RegOpenKeyExA
Sections
0 Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 844B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 90B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 421KB - Virtual size: 420KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ