Static task
static1
Behavioral task
behavioral1
Sample
41238102e282c66732f03b81a5fdbd5e2ef1db8dceb49d735eb055f51ae8686e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
41238102e282c66732f03b81a5fdbd5e2ef1db8dceb49d735eb055f51ae8686e.exe
Resource
win10v2004-20220812-en
General
-
Target
41238102e282c66732f03b81a5fdbd5e2ef1db8dceb49d735eb055f51ae8686e
-
Size
164KB
-
MD5
175c3e0e387a5e5ce826c86bbfc684d4
-
SHA1
d0824d918bc8a5984d04f0ff2d44dda0e21d7817
-
SHA256
41238102e282c66732f03b81a5fdbd5e2ef1db8dceb49d735eb055f51ae8686e
-
SHA512
9d92dc265b1487abe8a659517e6e74bb4d20c94178ffdef767e960b7716982256e80b11db0d42366d612df1611710cf33d345f774b7dc7420639da2fbf3173e5
-
SSDEEP
3072:c4KJ39lpnmQ0egsUJQrhfHs93JXEnLzv7Q7LvGYw0ubndxenfhSzifBAYM0Yl7wk:729lYN8rhPs93pUfSLvvYbnveKif07ZJ
Malware Config
Signatures
Files
-
41238102e282c66732f03b81a5fdbd5e2ef1db8dceb49d735eb055f51ae8686e.exe windows x86
3a94fa19f89ce1253dfafdb37aecb38e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiOpenDevRegKey
SetupDiGetClassDevsA
msvcp71
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Nomemory@std@@YAXXZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
msvcr71
memset
_setmbcp
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__CxxFrameHandler
??3@YAXPAX@Z
_mbsstr
_mbscmp
free
_except_handler3
malloc
atoi
_callnewh
__security_error_handler
__dllonexit
_onexit
_c_exit
_exit
_XcptFilter
_ismbblead
_cexit
exit
_acmdln
_controlfp
_amsg_exit
kernel32
GetThreadLocale
GetVersionExA
WideCharToMultiByte
InitializeCriticalSection
DeleteCriticalSection
WaitForSingleObject
SetEvent
CreateThread
CreateEventA
CloseHandle
OutputDebugStringA
lstrlenW
ResetEvent
WaitForMultipleObjects
lstrlenA
InterlockedIncrement
InterlockedDecrement
GetLastError
GetLocaleInfoA
WriteFile
ReadFile
CreateFileA
WaitNamedPipeA
ExitProcess
GetModuleHandleA
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
MultiByteToWideChar
InterlockedExchange
advapi32
RegCloseKey
RegQueryValueExA
ole32
CoCreateInstance
CoInitializeEx
oleaut32
SafeArrayDestroy
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayGetElement
VarBstrCmp
SysFreeString
mfc71
ord6276
ord3801
ord6278
ord4014
ord4038
ord4326
ord1185
ord3683
ord4541
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord1920
ord2931
ord5224
ord5226
ord2248
ord3948
ord4568
ord5230
ord5213
ord5566
ord2537
ord2731
ord2835
ord4307
ord2714
ord2838
ord2540
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4481
ord4261
ord3333
ord566
ord757
ord2322
ord310
ord745
ord578
ord781
ord6138
ord1084
ord304
ord557
ord1207
ord5715
Sections
.text Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 344B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE