Static task
static1
Behavioral task
behavioral1
Sample
33d3f82ff3890fcf0440b381b5f3aefe5da0850e8e3e33d60eafeb58bdc114ae.exe
Resource
win7-20220901-en
General
-
Target
33d3f82ff3890fcf0440b381b5f3aefe5da0850e8e3e33d60eafeb58bdc114ae
-
Size
94KB
-
MD5
2b0e60a31781b656140f5ed7d8699650
-
SHA1
660cce5949576352f042b55f542a40558a4e08a8
-
SHA256
33d3f82ff3890fcf0440b381b5f3aefe5da0850e8e3e33d60eafeb58bdc114ae
-
SHA512
048d7a0a12334b398c49644e118c7d486bc0a75f4783fd9dd2a22f1fd4f745879b9805ecd91c20894bb98890bab4e3f86bf6359ee89c1320c725d6fc4d447626
-
SSDEEP
1536:Nyq1zAYxEOWWh/M7nMz5z7uyVmBmYSlYr765I7N7d3sJw/pUN1HP:NRtAYxEOWWh2n+nuyV7YKYCI/c1HP
Malware Config
Signatures
Files
-
33d3f82ff3890fcf0440b381b5f3aefe5da0850e8e3e33d60eafeb58bdc114ae.exe windows x86
d605e512b08208f0e51e4a1c7df7eaf0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
kernel32
GetLocaleInfoA
GetThreadLocale
GetSystemTimeAsFileTime
GetModuleFileNameA
CreateFileA
VirtualFree
VirtualAlloc
SetFilePointer
FlushInstructionCache
WriteFile
GetCurrentProcess
FileTimeToSystemTime
ReadFile
SetEndOfFile
GetProcessTimes
FileTimeToLocalFileTime
GetModuleHandleA
GetPrivateProfileIntA
GetFileAttributesA
CreateProcessA
WritePrivateProfileStringA
GetPrivateProfileStringA
TerminateProcess
CloseHandle
CreateToolhelp32Snapshot
CreateDirectoryA
Process32First
OutputDebugStringA
Process32Next
OpenProcess
InterlockedExchange
GetVersionExA
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
Sleep
GetACP
user32
SetWindowLongA
DestroyWindow
IsWindow
MessageBoxA
DispatchMessageA
TranslateMessage
GetMessageA
CallWindowProcA
CreateWindowExA
GetWindowLongA
shell32
SHGetSpecialFolderPathA
shlwapi
StrChrA
msvcp80
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?find_last_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
?begin@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AV?$_String_iterator@DU?$char_traits@D@std@@V?$allocator@D@2@@2@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@V?$_String_const_iterator@DU?$char_traits@D@std@@V?$allocator@D@2@@2@0@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
msvcr80
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_except_handler4_common
_invoke_watson
_controlfp_s
__CxxFrameHandler3
memset
??3@YAXPAX@Z
_localtime64
_invalid_parameter_noinfo
_time64
_vsnprintf_s
_access
sscanf
_snprintf
atoi
_errno
_mbsrchr
strftime
atol
_getpid
??2@YAPAXI@Z
_stricmp
_unlock
__dllonexit
_encode_pointer
_lock
_onexit
_decode_pointer
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
?terminate@@YAXXZ
Sections
.text Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE