Static task
static1
Behavioral task
behavioral1
Sample
3fb021f6add25fd4c7c3fea7663d376825034744d1ec2cb319a4d6e0e509d3ec.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3fb021f6add25fd4c7c3fea7663d376825034744d1ec2cb319a4d6e0e509d3ec.exe
Resource
win10v2004-20220901-en
General
-
Target
3fb021f6add25fd4c7c3fea7663d376825034744d1ec2cb319a4d6e0e509d3ec
-
Size
280KB
-
MD5
6e41e76c3d07539e2bab4a40f164ca10
-
SHA1
16688ef255cfa42d1ab89ebbb0eb22a7b42fdd5d
-
SHA256
3fb021f6add25fd4c7c3fea7663d376825034744d1ec2cb319a4d6e0e509d3ec
-
SHA512
4c74579c3145d2ff35d14b84785f309a03f0a0f062b664838bd8c1270639e76e09af44c7aa1cf65c95e6dd78a10ecc2f9881cd596886afe2a4466a1d723fe535
-
SSDEEP
6144:X6Ym3lQirtixNjSfALXqo1jmUZxL6xQGQs3ch:X6YUWhSILXqs76hch
Malware Config
Signatures
Files
-
3fb021f6add25fd4c7c3fea7663d376825034744d1ec2cb319a4d6e0e509d3ec.exe windows x86
bdfd08bb5654a46804efd557b52d99ac
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
GetModuleFileNameA
EnterCriticalSection
lstrlenW
WideCharToMultiByte
RaiseException
InitializeCriticalSection
DeleteCriticalSection
GetLastError
CloseHandle
WaitForSingleObject
lstrcmpiA
Sleep
CreateThread
CreateEventA
lstrcpynA
lstrcpyA
MultiByteToWideChar
GetCurrentThreadId
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
GetCommandLineA
SetEvent
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
ExitProcess
GetSystemTimeAsFileTime
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
lstrcatA
InterlockedExchange
user32
CharUpperA
TranslateMessage
DispatchMessageA
GetMessageA
PostThreadMessageA
CharNextA
advapi32
RegQueryInfoKeyA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyExA
RegSetValueExA
ole32
CoRegisterClassObject
CoUninitialize
CoInitialize
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
StringFromGUID2
CoCreateInstance
CoRevokeClassObject
oleaut32
VarBstrCmp
SysStringByteLen
SysAllocStringByteLen
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
SysStringLen
LoadTypeLi
LoadRegTypeLi
VariantChangeType
VariantCopy
VariantClear
SysFreeString
SysAllocString
VariantInit
shlwapi
PathFindExtensionA
msvcr71
??0exception@@QAE@XZ
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
exit
_cexit
_initterm
_ismbblead
_XcptFilter
_exit
_c_exit
_onexit
__dllonexit
?terminate@@YAXXZ
??1type_info@@UAE@XZ
__security_error_handler
memset
_ltow
wcscmp
_purecall
__getmainargs
_amsg_exit
??3@YAXPAX@Z
_CxxThrowException
??_V@YAXPAX@Z
??2@YAPAXI@Z
__CxxFrameHandler
free
malloc
_resetstkoflw
_except_handler3
??_U@YAPAXI@Z
??1exception@@UAE@XZ
memmove
wcsncpy
realloc
??0exception@@QAE@ABV0@@Z
_acmdln
msvcp71
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
Sections
.text Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 632B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tc Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE