Static task
static1
Behavioral task
behavioral1
Sample
a3f5a1896f63a3e31b769571bbac69809c18d629aab1d0de3519af08e62301ed.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a3f5a1896f63a3e31b769571bbac69809c18d629aab1d0de3519af08e62301ed.exe
Resource
win10v2004-20220812-en
General
-
Target
a3f5a1896f63a3e31b769571bbac69809c18d629aab1d0de3519af08e62301ed
-
Size
1.4MB
-
MD5
812d641fd3585e0259e903693b14452a
-
SHA1
b05769138fddc481efa89dd9405d6c3d7c423081
-
SHA256
a3f5a1896f63a3e31b769571bbac69809c18d629aab1d0de3519af08e62301ed
-
SHA512
ac04e345a0fb893f5fceebafcf969642401794df08c649907e2beaf598ccef482113b9152c3cc8487df40ec5bb4fb57bde5a30e582a85190d79875792f576e25
-
SSDEEP
24576:Z+NZcCD5uuzaFO1VPYT12EQay/TBe2JLnJL:ZKcmwNFO1k1oay/TLJL
Malware Config
Signatures
Files
-
a3f5a1896f63a3e31b769571bbac69809c18d629aab1d0de3519af08e62301ed.exe windows x86
f3ae82440c89bd20d329cb2b0356a144
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForDebugEvent
DeleteTimerQueue
GetConsoleInputExeNameA
SetConsoleScreenBufferSize
lstrcpyA
ReadConsoleInputA
GetSystemWindowsDirectoryA
VirtualUnlock
VerSetConditionMask
ExitThread
GetProcessHeap
GetUserDefaultLCID
IsBadStringPtrA
LoadLibraryExA
SetFileAttributesA
AddAtomA
VirtualAlloc
SetInformationJobObject
FillConsoleOutputCharacterA
GetWindowsDirectoryA
GetWindowsDirectoryA
IsProcessorFeaturePresent
GetVolumePathNameA
CloseHandle
dpnet
DirectPlay8Create
advapi32
CredFree
Sections
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 338KB - Virtual size: 338KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 460KB - Virtual size: 729KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 397KB - Virtual size: 396KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ