Static task
static1
Behavioral task
behavioral1
Sample
3b2bcec142eb31919ecabd5c869a3def2689b747705a127c254abd466db4ead7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3b2bcec142eb31919ecabd5c869a3def2689b747705a127c254abd466db4ead7.exe
Resource
win10v2004-20220812-en
General
-
Target
3b2bcec142eb31919ecabd5c869a3def2689b747705a127c254abd466db4ead7
-
Size
100KB
-
MD5
490851961695fbf8cd68b5dca2eeabd8
-
SHA1
121a05e84ca99ca4325a23244aae9600ad9011f2
-
SHA256
3b2bcec142eb31919ecabd5c869a3def2689b747705a127c254abd466db4ead7
-
SHA512
f5ba2bd4c9ea4c3f99ac2c05c625fe6b9d2bec777c72e1097efa0b0a39b1e280f7419ec624c05ec34e4f56df7db80b050c0aa6a847a1e33ec83cce33f9ff01ca
-
SSDEEP
3072:pl2DPTYA7y4b9jO0ostEckQg33SUEgj8CU:OQqhloaNoicq
Malware Config
Signatures
Files
-
3b2bcec142eb31919ecabd5c869a3def2689b747705a127c254abd466db4ead7.exe windows x86
0f2cbea041013d5f4f5d13124622d4b8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegDeleteValueW
RegSetValueExW
RegDeleteKeyW
RegQueryInfoKeyW
RegCreateKeyExW
kernel32
GetModuleFileNameW
GetVersionExW
GetLastError
SetFileAttributesW
GetFileAttributesW
CompareStringW
lstrlenW
FlushFileBuffers
WriteFile
GetTimeFormatW
GetDateFormatW
GetLocalTime
ExpandEnvironmentStringsW
lstrcmpiW
RemoveDirectoryW
DeleteFileW
CloseHandle
SetFilePointer
CreateFileW
GetTempPathW
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoW
RtlUnwind
SetUnhandledExceptionFilter
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
LocalAlloc
LocalFree
GetNativeSystemInfo
SearchPathW
FindResourceW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
UnmapViewOfFile
FreeLibrary
GetLocaleInfoW
CreateFileMappingW
MapViewOfFile
LoadLibraryExW
FindResourceExW
LoadResource
SetLastError
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
user32
LoadStringW
msvcrt
_vsnwprintf
memset
??3@YAXPAX@Z
??2@YAPAXI@Z
_controlfp
?terminate@@YAXXZ
memcpy
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_amsg_exit
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
wcsncmp
_wcsicmp
_wcsnicmp
bsearch
ole32
CoUninitialize
CoCreateInstance
CoInitialize
shell32
SHGetSpecialFolderPathW
SHGetFolderPathW
SHChangeNotify
shlwapi
PathAppendW
PathRemoveFileSpecW
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ