Static task
static1
Behavioral task
behavioral1
Sample
3063e803297785cc396e7342e401100f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3063e803297785cc396e7342e401100f.exe
Resource
win10v2004-20220812-en
General
-
Target
3063e803297785cc396e7342e401100f.exe
-
Size
664KB
-
MD5
3063e803297785cc396e7342e401100f
-
SHA1
e590b314e4e0dc98d4e691f43af84e390cb5993f
-
SHA256
4642c5bc794aed8a3c6280bb9565a346588e4e35f054332553bc581b2cb5d489
-
SHA512
18d610c7ec357bd895578ab93503689abde0707a261096ad8989eee12ac4d1d1998ece6951a59771e67b83639cbd8530203dd82006ffff563bfb9a518770a1a6
-
SSDEEP
12288:qIDKtULYbQyZKghunEJCFZ5lVJZ0LYXpOwt92f0xkONQm6SkIRq0/FZbz234nY:qXWCQy3u/RZyQpN0zEQ3RIRq07+3d
Malware Config
Signatures
Files
-
3063e803297785cc396e7342e401100f.exe.exe windows x86
2d5ec24fb9d2ee4cf8208f9e16125d4f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
InterlockedPushEntrySList
GetConsoleAliasesW
ReadFile
ReadConsoleW
GetVolumeInformationA
GetComputerNameA
LocalFree
InterlockedDecrement
SetSystemTimeAdjustment
SetLocaleInfoA
FindNextVolumeA
FindCloseChangeNotification
CopyFileExA
MoveFileWithProgressW
VerifyVersionInfoW
LocalSize
FileTimeToDosDateTime
DebugBreak
GlobalGetAtomNameW
IsBadWritePtr
FindResourceA
GetComputerNameExW
GetProcAddress
GetStringTypeW
GetFileTime
GetConsoleAliasesLengthW
GetVolumeNameForVolumeMountPointA
DeleteVolumeMountPointA
GetCPInfo
PostQueuedCompletionStatus
MoveFileWithProgressA
CopyFileA
lstrcpynW
WriteConsoleW
GetBinaryTypeA
WriteConsoleOutputW
GetCommandLineA
InterlockedIncrement
CreateActCtxW
FormatMessageA
GetModuleHandleW
GetModuleHandleA
LeaveCriticalSection
GetStringTypeExA
OpenMutexW
FindResourceW
RtlCaptureContext
InterlockedExchange
InitializeCriticalSectionAndSpinCount
DeleteFiber
InterlockedExchangeAdd
EnumDateFormatsA
GetPrivateProfileStructA
GetNamedPipeHandleStateW
RegisterWaitForSingleObject
LocalAlloc
QueryMemoryResourceNotification
SetLastError
GetProcessPriorityBoost
GetMailslotInfo
HeapWalk
SetFilePointer
SetConsoleMode
RaiseException
RtlUnwind
GetLastError
MoveFileA
DeleteFileA
GetStartupInfoA
HeapAlloc
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
EnterCriticalSection
VirtualAlloc
HeapReAlloc
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
LCMapStringA
LCMapStringW
user32
CharUpperBuffW
winhttp
WinHttpCreateUrl
Sections
.text Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 588KB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ