Static task
static1
Behavioral task
behavioral1
Sample
3b8f32476fb8eda20f9e547c1dd9afa7fae139ee87db5dab8bf8d23c55004778.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3b8f32476fb8eda20f9e547c1dd9afa7fae139ee87db5dab8bf8d23c55004778.exe
Resource
win10v2004-20220812-en
General
-
Target
3b8f32476fb8eda20f9e547c1dd9afa7fae139ee87db5dab8bf8d23c55004778
-
Size
136KB
-
MD5
a249e66e4554fe1a9af17a6cbfccaf70
-
SHA1
95a40d7d5ae941684260e2652b79a8ff4594b4c5
-
SHA256
3b8f32476fb8eda20f9e547c1dd9afa7fae139ee87db5dab8bf8d23c55004778
-
SHA512
ee9fc9564b417a510bc9a201332305ec081adb9439156a4a59f7c73d9808f74928e40fa993d56014a35f57d167eb0f5cf16621b6b82a8a29d05b5d5ff1ddb5fb
-
SSDEEP
3072:siq16snddDP0aF8KYGCvgom5tHCfQX7msDypCfR:pxsnddb05DGCoom5tHCG7ms
Malware Config
Signatures
Files
-
3b8f32476fb8eda20f9e547c1dd9afa7fae139ee87db5dab8bf8d23c55004778.exe windows x86
2155e42aa6a6c8e8696d1f9b8e73fdfe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersion
InterlockedCompareExchange
LoadLibraryA
LoadResource
LocalFree
MultiByteToWideChar
OpenProcess
OpenSemaphoreW
ProcessIdToSessionId
ReadFile
GetLocalTime
GetSystemInfo
SetEvent
SetFilePointer
Sleep
TerminateProcess
TerminateThread
WaitForSingleObject
WideCharToMultiByte
WriteFile
GetLastError
GetFileAttributesW
GetProcAddress
GetModuleHandleW
GetModuleHandleA
SetErrorMode
GetModuleFileNameW
GetDateFormatW
GetComputerNameW
GetCommandLineW
FreeLibrary
FormatMessageW
FindResourceExW
ExpandEnvironmentStringsW
ExitProcess
DeleteFileW
lstrcatW
CreateThread
CreateSemaphoreW
CreateDirectoryW
CloseHandle
VirtualAlloc
GetCurrentProcess
GlobalAlloc
CreateFileW
GetWindowsDirectoryW
ReleaseSemaphore
user32
GetSysColor
gdi32
GetTextMetricsW
GetTextExtentPointW
GetStockObject
SelectObject
advapi32
RegCloseKey
RegisterEventSourceW
RegSetValueExW
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExW
RegOpenKeyExA
RegDeleteValueW
RegCreateKeyW
RegCreateKeyExW
ReadEventLogW
OpenEventLogW
IsTextUnicode
InitializeSecurityDescriptor
GetUserNameW
DeregisterEventSource
CloseEventLog
ClearEventLogW
RegOpenKeyA
SetSecurityDescriptorDacl
ReportEventW
shell32
DragAcceptFiles
ShellAboutW
DragQueryFileW
DragFinish
msvcrt
memcpy
_XcptFilter
__getmainargs
__initenv
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
_snwprintf
_vsnwprintf
_wcsicmp
_wgetcwd
_wmakepath
_wsplitpath
_wtoi
_wtol
calloc
exit
free
isdigit
isprint
iswctype
localtime
malloc
realloc
sprintf
strchr
swprintf
swscanf
time
tolower
wcscat
wcscmp
wcscpy
wcslen
wcsncmp
wcsncpy
wprintf
Sections
.text Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 804B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text2 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ