Static task
static1
Behavioral task
behavioral1
Sample
3a8ff2c233fa768e8ce6445b3ca6cd15dbf71ffb0a0b8099b4e027f5d9aa9404.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3a8ff2c233fa768e8ce6445b3ca6cd15dbf71ffb0a0b8099b4e027f5d9aa9404.exe
Resource
win10v2004-20220812-en
General
-
Target
3a8ff2c233fa768e8ce6445b3ca6cd15dbf71ffb0a0b8099b4e027f5d9aa9404
-
Size
135KB
-
MD5
41058a882d99303916677022d446127e
-
SHA1
bd14181f9165b33fd6f75cd5fe48f50771616df7
-
SHA256
3a8ff2c233fa768e8ce6445b3ca6cd15dbf71ffb0a0b8099b4e027f5d9aa9404
-
SHA512
f6ba0d6e4cdb01c45b7f82b02487f7278cc73c4ff0d021d00c3f04e9bdf4256de81045609932a590ae704ebe8221a866fdeb5e40a11b3f2b61879df465fcf43e
-
SSDEEP
3072:7+FDzK71QkbstyJjCKICpC72s/mlaXRNgcWI//R:7+I713bstyJj0sC7/HRNJlZ
Malware Config
Signatures
Files
-
3a8ff2c233fa768e8ce6445b3ca6cd15dbf71ffb0a0b8099b4e027f5d9aa9404.exe windows x86
ddbb90ebf41500dde8a2155d2d44be6d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
VariantChangeTypeEx
SysStringLen
SysAllocStringLen
VariantCopyInd
VariantClear
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
advapi32
RegQueryValueExA
RegCloseKey
OpenProcessToken
RegOpenKeyExA
LookupPrivilegeValueA
kernel32
SetCommConfig
CreateFileA
CloseHandle
FindResourceA
Sleep
DeleteFileA
VirtualFree
SetFilePointer
SetErrorMode
GetSystemInfo
RemoveDirectoryA
ReadFile
GetUserDefaultLangID
OutputDebugStringA
GetEnvironmentVariableA
GetWindowsDirectoryA
GetLocaleInfoA
LoadLibraryA
GetACP
LockResource
GetFileSize
FormatMessageA
FlushViewOfFile
GetExitCodeProcess
GetFullPathNameA
GetLastError
GetSystemDefaultLCID
SetEndOfFile
GetFileAttributesA
LoadResource
VirtualQuery
GetCurrentProcess
SizeofResource
GetProcAddress
GetVersionExA
GetModuleHandleA
GetCommandLineA
GetModuleFileNameA
IsDBCSLeadByte
CreateProcessA
VirtualProtect
CreateDirectoryA
VirtualAlloc
InterlockedExchange
WriteFile
ReadFile
GetCommandLineA
GetModuleHandleA
GetLastError
GetStdHandle
CreateFileA
GetFileSize
ExitProcess
WideCharToMultiByte
LocalAlloc
TlsSetValue
VirtualAlloc
LocalFree
WriteFile
LeaveCriticalSection
GetFileType
SetEndOfFile
TlsGetValue
SetFilePointer
CloseHandle
VirtualFree
MultiByteToWideChar
GetSystemTime
RaiseException
EnterCriticalSection
DeleteCriticalSection
user32
MessageBoxA
SetWindowLongA
CharPrevA
ExitWindowsEx
TranslateMessage
MsgWaitForMultipleObjects
LoadStringA
CallWindowProcA
DestroyWindow
CreateWindowExA
PeekMessageA
DispatchMessageA
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.packed Size: 142KB - Virtual size: 143KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dqvmfdz Size: 82KB - Virtual size: 82KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 285KB - Virtual size: 286KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hdzlles Size: 109KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xhnkvub Size: 6KB - Virtual size: 6KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE