Static task
static1
Behavioral task
behavioral1
Sample
31fc00c9af1dc7a3f738896a5b38cc96487434d78d0592138132950c48f1dc07.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
31fc00c9af1dc7a3f738896a5b38cc96487434d78d0592138132950c48f1dc07.exe
Resource
win10v2004-20220812-en
General
-
Target
31fc00c9af1dc7a3f738896a5b38cc96487434d78d0592138132950c48f1dc07
-
Size
279KB
-
MD5
4b9b3a05c6e52a9d2e50f588ffaca7b0
-
SHA1
a807879d5078e53effd7f771fa31879f01550f4a
-
SHA256
31fc00c9af1dc7a3f738896a5b38cc96487434d78d0592138132950c48f1dc07
-
SHA512
ec5a181a3a3a025a6108b5d1e3c8b3a550e879a99f8d6ba59537e04e5cea4a218b6290178b5285fa89a7d93e1472c9c5649eb130e6565b399706e86d2e4f5746
-
SSDEEP
6144:Gcub7X69gQmgWY/3B6U8ime3tpPH7zlknQwic8caxBSg:ibb6eQm/Y/3znP99H7zyQwxsxBSg
Malware Config
Signatures
Files
-
31fc00c9af1dc7a3f738896a5b38cc96487434d78d0592138132950c48f1dc07.exe windows x86
74cdc975eca005d3bd1b0f500f3d9c43
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileW
CreateDirectoryA
CreateDirectoryW
CreateEventA
CreateEventW
CreateFileA
CreateFileW
CreateMutexA
CreateMutexW
CreateProcessA
CreateProcessW
CreateThread
DeleteCriticalSection
DeleteFileA
DeleteFileW
DeviceIoControl
EnterCriticalSection
ExpandEnvironmentStringsA
ExpandEnvironmentStringsW
FileTimeToSystemTime
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FreeLibrary
GetCurrentDirectoryA
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeA
GetDriveTypeW
GetExitCodeProcess
GetExitCodeThread
GetFileAttributesA
GetFileAttributesW
GetFileTime
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetPrivateProfileStringA
GetProcAddress
GetProcessHeap
GetProfileStringA
GetProfileStringW
CopyFileA
GetSystemDefaultLangID
GetSystemDirectoryA
GetSystemDirectoryW
GetSystemTimeAsFileTime
GetTickCount
GetUserDefaultLangID
GetVersion
GetVersionExA
GetWindowsDirectoryA
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
MapViewOfFile
MultiByteToWideChar
OpenEventA
OpenEventW
QueryDosDeviceA
QueryDosDeviceW
QueryPerformanceCounter
ReadFile
ReleaseMutex
RemoveDirectoryA
RemoveDirectoryW
ResetEvent
SetCurrentDirectoryA
SetCurrentDirectoryW
SetEndOfFile
SetErrorMode
SetEvent
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
WriteProfileStringA
WriteProfileStringW
lstrcpynW
lstrlenA
lstrlenW
CompareStringA
CloseHandle
GetCommandLineW
GetStartupInfoA
VirtualAlloc
user32
LoadCursorA
LoadIconA
gdi32
GetStockObject
advapi32
RegOpenKeyExW
RegCloseKey
Sections
.text Size: 271KB - Virtual size: 270KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 552B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ