Static task
static1
Behavioral task
behavioral1
Sample
3a4437a5464c454653d893f6acb37f67df3e925dd96c89cb0497fc01718d2fc9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3a4437a5464c454653d893f6acb37f67df3e925dd96c89cb0497fc01718d2fc9.exe
Resource
win10v2004-20220812-en
General
-
Target
3a4437a5464c454653d893f6acb37f67df3e925dd96c89cb0497fc01718d2fc9
-
Size
372KB
-
MD5
80636a6038910dd74c3d6bf392271db0
-
SHA1
b82af0866fd6237b042d503bc5206a1b2a54954e
-
SHA256
3a4437a5464c454653d893f6acb37f67df3e925dd96c89cb0497fc01718d2fc9
-
SHA512
f8372e20614fce27e3a243d0d17433d76033f6667e2ce3a2680bac7386b932bb6681dbccaf8b2d2e9a0cbc74929bd9c6b75d58443a72b6028ce5662f50af5748
-
SSDEEP
3072:p8lIcllaNTBfoDz6PrNOQxSkT5lnjjJi2o86qTaSUCmHXzoI7h+aS1Gb:4zqhOZw/njRP6EXwzo0naGb
Malware Config
Signatures
Files
-
3a4437a5464c454653d893f6acb37f67df3e925dd96c89cb0497fc01718d2fc9.exe windows x86
8861bbe84108b46835715883d08cea79
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathRemoveFileSpecA
PathFileExistsA
PathRemoveExtensionA
PathFindFileNameA
PathAppendA
PathAddBackslashA
PathGetArgsA
dynamic7z
ord3
ord6
ord1
ord2
stlport51r
??1?$vector@PAU_Slist_node_base@priv@stlp_std@@V?$allocator@PAU_Slist_node_base@priv@stlp_std@@@3@@stlp_std@@QAE@XZ
?reserve@?$vector@PAU_Slist_node_base@priv@stlp_std@@V?$allocator@PAU_Slist_node_base@priv@stlp_std@@@3@@stlp_std@@QAEXI@Z
?_S_next_size@?$_Stl_prime@_N@priv@stlp_std@@SAII@Z
??1?$basic_string@DV?$char_traits@D@stlp_std@@V?$allocator@D@2@@stlp_std@@QAE@XZ
?deallocate@__node_alloc@stlp_std@@SAXPAXI@Z
??0?$vector@PAU_Slist_node_base@priv@stlp_std@@V?$allocator@PAU_Slist_node_base@priv@stlp_std@@@3@@stlp_std@@QAE@ABV?$allocator@PAU_Slist_node_base@priv@stlp_std@@@1@@Z
?allocate@__node_alloc@stlp_std@@SAPAXAAI@Z
??1?$allocator@PAU_Slist_node_base@priv@stlp_std@@@stlp_std@@QAE@XZ
?assign@?$vector@PAU_Slist_node_base@priv@stlp_std@@V?$allocator@PAU_Slist_node_base@priv@stlp_std@@@3@@stlp_std@@QAEXIABQAU_Slist_node_base@priv@2@@Z
mfc80
ord3719
ord907
ord3718
ord2020
ord2533
ord605
ord2646
ord2540
ord2838
ord2714
ord4307
ord2835
ord2731
ord2537
ord4541
ord5566
ord3683
ord5213
ord5230
ord1934
ord4568
ord3948
ord2248
ord566
ord5226
ord757
ord304
ord5224
ord2931
ord3210
ord1920
ord3832
ord5382
ord578
ord6219
ord5102
ord1010
ord3806
ord3830
ord5583
ord1084
ord2396
ord347
ord2398
ord602
ord2400
ord1123
ord2410
ord1279
ord2390
ord934
ord784
ord930
ord932
ord928
ord923
ord5233
ord5235
ord5960
ord4580
ord1600
ord4282
ord4722
ord2371
ord3403
ord1929
ord6090
ord4353
ord5203
ord2657
ord4185
ord2164
ord1903
ord6275
ord5073
ord1908
ord5152
ord385
ord4244
ord630
ord1401
ord3056
ord3946
ord2021
ord1617
ord3088
ord1620
ord501
ord5912
ord709
ord3182
ord6724
ord4262
ord4486
ord1551
ord5419
ord2862
ord1670
ord354
ord5200
ord1671
ord1599
ord4890
ord1655
ord4735
ord4104
ord1656
ord4212
ord3709
ord5182
ord3641
ord4035
ord6067
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord1063
ord4749
ord2178
ord2405
ord2387
ord1280
ord2367
ord2385
ord2403
ord2415
ord2392
ord2408
ord2413
ord762
ord265
ord266
ord2644
ord911
ord3949
ord4481
ord4261
ord2271
ord2322
ord908
ord3333
ord310
ord4038
ord4014
ord6278
ord3801
ord6276
ord4326
ord3161
ord2063
ord2018
ord764
ord1207
ord2394
ord1964
msvcr80
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler4_common
?terminate@@YAXXZ
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_invoke_watson
_controlfp_s
_amsg_exit
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
__CxxFrameHandler3
??0exception@std@@QAE@ABQBDH@Z
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABV01@@Z
memmove
_purecall
_vsnprintf_s
_CxxThrowException
memset
raise
_setmbcp
__getmainargs
kernel32
FindFirstFileA
FindClose
DebugBreak
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
OutputDebugStringA
GetEnvironmentVariableA
SetEnvironmentVariableA
GetModuleFileNameA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
TerminateThread
WaitForSingleObject
CreateThread
GetCurrentProcess
CreateProcessA
CopyFileA
CreateDirectoryA
GetTempFileNameA
GetLastError
GetCommandLineA
GetCurrentDirectoryA
SetCurrentDirectoryA
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetTempPathA
DeleteFileA
GetTickCount
Sleep
InterlockedExchange
user32
WaitForInputIdle
PostThreadMessageA
LoadIconA
GetDC
LoadBitmapA
DrawIcon
AppendMenuA
GetActiveWindow
MessageBoxA
GetClientRect
GetSystemMetrics
IsIconic
EnableWindow
SendMessageA
GetSystemMenu
PostMessageA
GetWindowRect
gdi32
CreateCompatibleDC
BitBlt
SelectObject
shell32
DragFinish
DragQueryFileA
comctl32
InitCommonControlsEx
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
Sections
.text Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 324KB - Virtual size: 323KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ