Static task
static1
Behavioral task
behavioral1
Sample
f3fc073040d7d9d3039df6aa9310771cdf20d0438028bbd8c8aacde409a9aaf0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f3fc073040d7d9d3039df6aa9310771cdf20d0438028bbd8c8aacde409a9aaf0.exe
Resource
win10v2004-20220901-en
General
-
Target
f3fc073040d7d9d3039df6aa9310771cdf20d0438028bbd8c8aacde409a9aaf0
-
Size
303KB
-
MD5
6f1da02e3b9af1000b85854edda4eadc
-
SHA1
4ebdbb570faa92b4252b1d8f1cb8b18b8dad4f50
-
SHA256
f3fc073040d7d9d3039df6aa9310771cdf20d0438028bbd8c8aacde409a9aaf0
-
SHA512
3f75ab0c89f8d183caf0de1379dff0e6c7976defcb5b9ff3a8c77d55849c141b4d88ae94be20f85c2c37c964e6c5b16ad5b3984e04f4005ab20c0c9f47238ca5
-
SSDEEP
6144:TMMzbyX0bkZxMuesalQ18CvhQ4EXxJPAgQx/YAp1F07iO/K5f:TLaBpespqCvhQpXxJIgQxFpPKNC5f
Malware Config
Signatures
Files
-
f3fc073040d7d9d3039df6aa9310771cdf20d0438028bbd8c8aacde409a9aaf0.exe windows x86
76543574868f043654d807eb7790cd8c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetProcessHeap
ResumeThread
GetModuleHandleA
ResumeThread
GetStdHandle
CreatePipe
IsBadReadPtr
GetLocaleInfoA
VirtualProtect
GetPriorityClass
HeapSize
GetCommandLineA
DeleteFileA
GlobalSize
SetEndOfFile
GetFileAttributesW
ReadConsoleW
GetDriveTypeA
WriteFile
CreateDirectoryA
SuspendThread
user32
LoadCursorA
DestroyMenu
wsprintfA
PeekMessageA
DestroyIcon
SetCursor
GetWindowLongA
SetRect
GetWindowLongA
GetScrollInfo
DispatchMessageA
DrawIcon
GetWindowTextW
els
DllCanUnloadNow
DllUnregisterServer
DllRegisterServer
DllGetClassObject
rasapi32
DwCloneEntry
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 296KB - Virtual size: 295KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE