Static task
static1
Behavioral task
behavioral1
Sample
3c1577a935e05d2236d5602e60ac8bb116532384dcf8c578531477070764b4c3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3c1577a935e05d2236d5602e60ac8bb116532384dcf8c578531477070764b4c3.exe
Resource
win10v2004-20220901-en
General
-
Target
3c1577a935e05d2236d5602e60ac8bb116532384dcf8c578531477070764b4c3
-
Size
287KB
-
MD5
6262e50299e9fa89a2bd1122ddc7f1d6
-
SHA1
d265031f81acc52ffb17e5ae1485763bc4e310d2
-
SHA256
3c1577a935e05d2236d5602e60ac8bb116532384dcf8c578531477070764b4c3
-
SHA512
91948fc2ee1aefc52311ff7d20357b7d6022acbba87d950630087d8ce2dc61744e829e98f50f1bbaee61e3ba20c4436fb68fbb4d883efdbf03f988191df5bc04
-
SSDEEP
6144:LJSrTKqt+nWBatiVPV3nNiue/aQK+yl7uHzfLMS:AmuVPL4aQ6qHzD3
Malware Config
Signatures
Files
-
3c1577a935e05d2236d5602e60ac8bb116532384dcf8c578531477070764b4c3.exe windows x86
eef998bd26366509c68ed3ad79d801c9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadLocale
GetCurrentProcessId
DeleteFileW
GetDriveTypeA
GlobalFindAtomA
lstrcmpiW
GetVersion
lstrlenW
GetCurrentThreadId
GetCommandLineW
GetTickCount
GetModuleHandleW
lstrlenA
MulDiv
GetCurrentProcess
VirtualAlloc
GetCurrentThread
SetCurrentDirectoryA
GetConsoleOutputCP
GetProcessHeap
gdi32
SetBkColor
GetStockObject
SetTextColor
SetMapMode
GetDIBColorTable
SelectPalette
RestoreDC
MoveToEx
SetBrushOrgEx
GetDeviceCaps
OffsetViewportOrgEx
LineTo
UnrealizeObject
ExcludeClipRect
SetColorSpace
EndDoc
SetBkMode
SetWindowExtEx
GetDCOrgEx
user32
GetDesktopWindow
GetMessagePos
GetInputState
CharNextA
comctl32
InitCommonControls
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 176KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE