Static task
static1
Behavioral task
behavioral1
Sample
260b3c8ee0c1a3e2fb1b47469759472419b0a17a545f3b142e2a5948a114fa8b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
260b3c8ee0c1a3e2fb1b47469759472419b0a17a545f3b142e2a5948a114fa8b.exe
Resource
win10v2004-20220812-en
General
-
Target
260b3c8ee0c1a3e2fb1b47469759472419b0a17a545f3b142e2a5948a114fa8b
-
Size
113KB
-
MD5
3ea801f2f5f6a2e8c8e3d7de98a592d0
-
SHA1
edf80d68eb0bff31fe084331fbc43567162b9e19
-
SHA256
260b3c8ee0c1a3e2fb1b47469759472419b0a17a545f3b142e2a5948a114fa8b
-
SHA512
8abb5e673c7110faa60f283637a93c6c2cd56ad971332e850f104a155c2ac425571b22eee6bd2da46ac2c99acc6ffa7084c114cf163fc074ff3eedb1ababd52b
-
SSDEEP
3072:LB3EJGrgOOJfU6Y5GBZgSypMlYQF+n1RV8CxVYBACP9DTf:L+JWOJ86aQZgSypZQS1RitBj9Dz
Malware Config
Signatures
Files
-
260b3c8ee0c1a3e2fb1b47469759472419b0a17a545f3b142e2a5948a114fa8b.exe windows x86
4c87b5999920f5bc8aa6670a6d44815c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc90u
ord1380
ord2369
ord5659
ord4603
ord6800
ord5512
ord2074
ord5598
ord4664
ord1493
ord4344
ord1751
ord1754
ord6411
ord3355
ord1681
ord4432
ord2650
ord2651
ord3287
ord5807
ord980
ord6381
ord3230
ord6379
ord3229
ord5338
ord3232
ord4553
ord4730
ord5450
ord5447
ord2860
ord2079
ord2445
ord5354
ord4985
ord4733
ord5948
ord5332
ord1410
ord2134
ord3106
ord5275
ord3819
ord4007
ord415
ord670
ord4720
ord5655
ord4429
ord5803
ord600
ord813
ord4890
ord4893
ord4043
ord589
ord794
ord513
ord736
ord341
ord617
ord286
ord5572
ord1186
ord1182
ord1183
ord1137
ord4441
ord570
ord6507
ord996
ord1616
ord5567
ord5831
ord374
ord639
ord4000
ord2208
ord3670
ord4681
ord4905
ord3115
ord6018
ord5663
ord5680
ord4996
ord4347
ord2447
ord5676
ord5674
ord3217
ord2087
ord4213
ord5830
ord6741
ord5548
ord1048
ord4179
ord6035
ord2206
ord2251
ord4747
ord6803
ord4173
ord6801
ord4423
ord4448
ord3589
ord5573
ord3515
ord4682
ord5625
ord3226
ord6376
ord4702
ord5653
ord5602
ord1492
ord4345
ord6408
ord3353
ord1675
ord1809
ord1810
ord5008
ord5324
ord5167
ord4631
ord5632
ord1603
ord938
ord280
ord1254
ord1250
ord811
ord266
ord265
ord3893
ord4022
ord3959
ord3988
ord510
ord740
ord296
ord2337
ord1188
ord1204
ord5140
ord2523
ord5685
ord2458
ord3537
ord2537
ord2106
ord3543
ord1354
ord1144
ord2592
ord6574
ord6187
ord525
ord3622
ord6095
ord4541
ord4410
ord321
ord1088
ord2451
ord2449
ord2452
ord4569
ord1276
ord6811
ord1219
ord5767
ord4690
ord3743
ord3114
ord6553
ord6440
ord3035
ord3340
ord4641
ord2094
ord5174
ord5289
ord4680
ord5946
ord3009
ord5861
ord1463
ord6046
ord5607
ord2239
ord2204
ord6762
ord2868
ord2861
ord4995
ord3102
ord3726
ord3335
ord1013
ord5914
ord6769
ord3414
ord5358
ord3299
ord2781
ord4437
ord6056
ord4951
ord4911
ord5832
ord5433
ord4673
ord5326
ord4884
ord2918
ord5352
ord4753
ord4756
ord4790
ord5351
ord5328
ord5243
ord4928
ord1811
ord2129
ord5280
ord3024
ord5141
ord5175
ord5290
ord291
ord818
ord307
ord311
ord3220
ord285
ord1607
ord4405
ord4518
ord2504
ord809
ord287
ord899
ord601
ord316
ord3948
ord4042
ord588
ord793
ord5624
ord4693
ord1441
ord3681
ord5664
ord5601
ord4378
ord5294
ord5297
ord4800
ord4805
ord4802
ord4820
ord4823
ord4807
ord5210
ord5020
ord4599
ord4590
ord5418
ord5214
ord4622
ord5224
ord4865
ord4866
ord3894
ord511
ord741
ord4944
ord4909
ord3235
ord3138
ord4301
ord5417
ord4814
ord5318
ord4796
ord5305
ord4936
ord5238
ord5455
ord5013
ord5266
ord5256
ord5315
ord3291
ord5291
ord5683
ord960
ord965
ord969
ord967
ord971
ord2615
ord2635
ord2619
ord2625
ord2623
ord2621
ord2638
ord2633
ord2617
ord2640
ord2628
ord2610
ord2612
ord2630
ord2375
ord2368
ord1641
ord6802
ord4174
ord6804
ord3682
ord5404
ord6375
ord3225
ord1442
ord2139
ord1792
ord1791
ord1727
ord5650
ord2771
ord2983
ord3112
ord4728
ord2966
ord3140
ord2774
ord2893
ord2764
ord4080
ord4081
ord4071
ord2891
ord4348
ord4910
ord4685
ord5615
ord5825
ord4723
ord5154
ord4697
ord1728
ord4906
ord6466
ord729
ord491
ord732
ord494
ord4019
ord3885
ord1272
ord799
ord1243
ord801
msvcr90
__CxxFrameHandler3
wcscat_s
memset
memcpy
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
malloc
free
_wsetlocale
mbstowcs_s
wcstombs_s
wcscpy_s
kernel32
MultiByteToWideChar
LoadLibraryW
GetLocaleInfoW
GetCurrentProcessId
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetUserDefaultLCID
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
Sleep
InterlockedExchange
MulDiv
user32
GetDC
EnableWindow
MessageBeep
ReleaseDC
gdi32
GetTextExtentPoint32W
GetTextMetricsW
CreateFontW
ole32
CoTaskMemAlloc
Sections
.text Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 76KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE