Static task
static1
Behavioral task
behavioral1
Sample
330d831b5f97d56b6e47d47256f0ae74d8dabbbbba18c232b942a80e8a9bf074.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
330d831b5f97d56b6e47d47256f0ae74d8dabbbbba18c232b942a80e8a9bf074.exe
Resource
win10v2004-20220812-en
General
-
Target
330d831b5f97d56b6e47d47256f0ae74d8dabbbbba18c232b942a80e8a9bf074
-
Size
101KB
-
MD5
61849b4c3ee4ed631af17cae52128650
-
SHA1
fc83347454e55df9586a55afea4aae20793f39cd
-
SHA256
330d831b5f97d56b6e47d47256f0ae74d8dabbbbba18c232b942a80e8a9bf074
-
SHA512
447dec95e0ffa0ea20f172c891e487b02d0580c58ac4dcf45a020a4c46f1dabb8c080a027ee79f3ed41513192e31d5da787f3ced9a522f8d366caf1d92efa381
-
SSDEEP
1536:hq1Cul90et8FV0gNnh3ns78IQO5q60lA+q2ygeaG2Bn8AoRay6ZuT9f9:ynl9P0Th3nJG5iS+ogSAmSQ9
Malware Config
Signatures
Files
-
330d831b5f97d56b6e47d47256f0ae74d8dabbbbba18c232b942a80e8a9bf074.exe windows x86
f448baad727f13828d4e2e7a02bfcec2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
printf
__setusermatherr
_XcptFilter
sinh
_except_handler3
_exit
__p__fmode
calloc
exit
__p__commode
_setmode
_adjust_fdiv
free
__getmainargs
__set_app_type
strcmp
_acmdln
__p__environ
abort
_initterm
_snprintf
kernel32
SetEvent
GlobalAlloc
GetCurrentProcess
SetThreadLocale
InterlockedDecrement
GetModuleHandleA
GetStartupInfoA
GetModuleFileNameW
WaitForSingleObject
GetExitCodeProcess
GetCurrentThread
GetProfileStringA
GetFileAttributesA
GetSystemDefaultLCID
GetProfileIntA
WaitForMultipleObjects
CreateEventA
VirtualProtect
GetTempPathW
ExitProcess
oleaut32
VariantInit
SafeArrayGetUBound
SafeArrayPtrOfIndex
SafeArrayCreate
SetErrorInfo
SafeArrayRedim
SafeArrayGetElement
VariantCopy
SafeArrayPutElement
SysFreeString
comctl32
ImageList_Read
ImageList_SetDragCursorImage
ImageList_DragShowNolock
ImageList_Replace
ImageList_SetIconSize
ImageList_GetBkColor
InitCommonControls
shell32
DragQueryFileW
SHFileOperationA
SHBrowseForFolderA
DragQueryFile
SHGetSettings
DoEnvironmentSubstW
ExtractIconExA
ShellExecuteExW
ShellExecuteEx
ExtractAssociatedIconW
SHGetSpecialFolderLocation
ole32
OleSetClipboard
CoCreateGuid
OleDraw
CoCreateInstance
OleFlushClipboard
ReleaseStgMedium
OleRun
RegisterDragDrop
CoLoadLibrary
CoRegisterMessageFilter
CoInitializeEx
CoGetMalloc
gdi32
DeleteDC
SetDIBits
CloseMetaFile
PolyBezierTo
SetPolyFillMode
SetTextJustification
DeleteMetaFile
SetStretchBltMode
GetTextExtentPointW
advapi32
CryptGenRandom
DeregisterEventSource
IsValidSid
RegOpenKeyA
CryptAcquireContextA
RegDeleteValueW
RegQueryInfoKeyA
OpenThreadToken
LookupPrivilegeValueA
CheckTokenMembership
RegDeleteValueA
AllocateAndInitializeSid
user32
DestroyCursor
SetCapture
ClientToScreen
SendMessageA
IsRectEmpty
PostMessageA
GetClassInfoA
PtInRect
RegisterClassA
GetCursorPos
SetPropA
DeleteMenu
SetFocus
CallNextHookEx
GetActiveWindow
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ