Static task
static1
Behavioral task
behavioral1
Sample
28b3aa4aa1f9e2af9871880517dc1e963f13570027b9c90c0a39b403d3ad8aa0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
28b3aa4aa1f9e2af9871880517dc1e963f13570027b9c90c0a39b403d3ad8aa0.exe
Resource
win10v2004-20220812-en
General
-
Target
28b3aa4aa1f9e2af9871880517dc1e963f13570027b9c90c0a39b403d3ad8aa0
-
Size
109KB
-
MD5
3c781745c28a90fbea26dc8ea537a2be
-
SHA1
9e08d028a68522aa0e2fdceb6d4dbabb323b2916
-
SHA256
28b3aa4aa1f9e2af9871880517dc1e963f13570027b9c90c0a39b403d3ad8aa0
-
SHA512
4fb7589a8fa9dff490a66924e6f48c4c56d7a5f1d76c497d67b2d86ead76cd9e5ba58bcaf44779cecc862d486ae245c8ed1d29fe1eb35f2283f857c7f3b4bed3
-
SSDEEP
1536:L3YNTu5xwusv9osVQDhxrguxUuNrrOqTW9wT+a/51qnm1nv:LINTu7AioQDhxrbUu3FT7kWv
Malware Config
Signatures
Files
-
28b3aa4aa1f9e2af9871880517dc1e963f13570027b9c90c0a39b403d3ad8aa0.exe windows x86
1730167a0974e70bdc9288c5a1ac8523
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
IsDBCSLeadByte
lstrcmpiA
GetExitCodeProcess
InterlockedIncrement
WritePrivateProfileStringA
VirtualProtect
DeleteFileA
GetFullPathNameA
GetConsoleMode
GetCurrentProcess
ExpandEnvironmentStringsA
GetTempPathA
CreateProcessW
IsDebuggerPresent
GetDriveTypeA
GetLocalTime
RemoveDirectoryA
GetStringTypeA
lstrcmpA
GetUserDefaultLangID
DeleteFileW
FormatMessageA
IsBadReadPtr
GlobalAlloc
GetLocaleInfoW
GetSystemTime
GetSystemDefaultLCID
RaiseException
LocalAlloc
GetTempPathW
lstrcpyA
GetModuleHandleW
GetDateFormatA
FreeEnvironmentStringsW
GetStartupInfoW
FileTimeToDosDateTime
LoadResource
GetModuleHandleA
SetHandleCount
GetThreadLocale
FileTimeToLocalFileTime
SetLastError
SystemTimeToFileTime
GetSystemDirectoryA
GlobalUnlock
GetFileType
FlushFileBuffers
msvcrt
__p__fmode
_XcptFilter
_adjust_fdiv
_initterm
_except_handler3
__p___initenv
__p__commode
_controlfp
__getmainargs
__setusermatherr
_exit
__set_app_type
user32
SetScrollRange
GetFocus
OpenClipboard
GetWindowTextA
BeginPaint
GetMenuState
GetTopWindow
EnableMenuItem
IsIconic
DrawFrameControl
SetClassLongA
SetMenu
GetScrollRange
IsZoomed
InvalidateRect
GetSystemMenu
PostMessageA
SetWindowsHookExA
GetMenu
OemToCharA
SetWindowTextA
IsWindow
GetSysColor
RemoveMenu
GetMenuItemID
SetRect
CloseClipboard
SetCursor
SystemParametersInfoA
CreatePopupMenu
GetWindowLongA
GetPropA
SetPropA
GetDlgItem
SetCapture
CharLowerA
EnumThreadWindows
ReleaseDC
CheckMenuItem
DrawEdge
advapi32
ControlService
AdjustTokenPrivileges
OpenServiceW
RegOpenKeyExA
RegQueryInfoKeyA
OpenProcessToken
CheckTokenMembership
AddAccessAllowedAce
RegDeleteKeyW
CryptDestroyHash
LookupPrivilegeValueA
RegFlushKey
GetSecurityDescriptorDacl
RegEnumValueW
CryptGenRandom
RegQueryValueExA
SetSecurityDescriptorGroup
OpenServiceA
RegOpenKeyA
RegCreateKeyA
QueryServiceStatus
RegEnumKeyW
IsValidSid
CryptAcquireContextA
CloseServiceHandle
CryptCreateHash
CopySid
GetLengthSid
RegEnumKeyExA
Sections
.text Size: 1024B - Virtual size: 812B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ