Static task
static1
Behavioral task
behavioral1
Sample
3753ddcbc0878f1f58ddd173119a8ca84c14b4c4dea406714d452b50efe0f2de.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3753ddcbc0878f1f58ddd173119a8ca84c14b4c4dea406714d452b50efe0f2de.exe
Resource
win10v2004-20220812-en
General
-
Target
3753ddcbc0878f1f58ddd173119a8ca84c14b4c4dea406714d452b50efe0f2de
-
Size
135KB
-
MD5
00316692ce6c6ff448236883118f5a81
-
SHA1
8ef4dce57cb5b11e0b14fb5955afa93f65b58d00
-
SHA256
3753ddcbc0878f1f58ddd173119a8ca84c14b4c4dea406714d452b50efe0f2de
-
SHA512
1bf5ac490ebefd8e5ed50d7919e0b8b8e8afb16c172fe00db65120b357e8f74da587cef4c85912e7ecf9890b121280290a6f589ac226914fb1efcbe654a7984f
-
SSDEEP
3072:4CuZIqH0bcq94/EvJKPT1iklwtLdUDAIjqy88oLzeUyD5KL:4CwVrwjv+1nqtLdI58U1IL
Malware Config
Signatures
Files
-
3753ddcbc0878f1f58ddd173119a8ca84c14b4c4dea406714d452b50efe0f2de.exe windows x86
90e9dbd5f5efd90ecceecdffdb8d1ba9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindAtomA
CreatePipe
GetFileType
GetProcessHeap
CreateSemaphoreW
GetCommandLineA
AddAtomA
ExitThread
RemoveDirectoryA
GetModuleHandleA
IsBadWritePtr
SetVolumeLabelA
ClearCommBreak
DeleteAtom
HeapFree
CreateDirectoryA
GetDriveTypeW
FindClose
SetEndOfFile
RemoveDirectoryA
WriteFile
HeapCreate
CloseHandle
GetModuleFileNameA
WaitForMultipleObjects
clbcatq
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
CoRegCleanup
msvidc32
DriverProc
DriverProc
DriverProc
DriverProc
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 10B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 127KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE