Static task
static1
Behavioral task
behavioral1
Sample
3b2be1ddad6beb9393b8766710075d653db41a7fe918ff6565a78ed1932bdbd2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3b2be1ddad6beb9393b8766710075d653db41a7fe918ff6565a78ed1932bdbd2.exe
Resource
win10v2004-20220812-en
General
-
Target
3b2be1ddad6beb9393b8766710075d653db41a7fe918ff6565a78ed1932bdbd2
-
Size
806KB
-
MD5
96425cb7058a3a11744debc48b47e960
-
SHA1
63970399a4696fd0db51d1729cfad8b1b7eb1fe0
-
SHA256
3b2be1ddad6beb9393b8766710075d653db41a7fe918ff6565a78ed1932bdbd2
-
SHA512
2145fc6800ce95515751d982f4262e93d3b82b1950c4df61d68ffaa26bed56c934cffb960ab1d1096330fe01a47a96ef24c6c94646301ab0b2155aac43974e17
-
SSDEEP
12288:HC1FIooq/4dStwoYOFv8Sv4B+1qrnPggPUX7M/5EI3xrPVNjkvVKYo/cSxoYmd6j:i1mupwot8S4B+1qD5l5EIV3IIWYmA
Malware Config
Signatures
Files
-
3b2be1ddad6beb9393b8766710075d653db41a7fe918ff6565a78ed1932bdbd2.exe windows x86
22a6bd6d31279fc37ec176565220a3eb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumePathNameW
GetMailslotInfo
IsValidLocale
DeleteFileA
SetConsoleTitleA
lstrcpyW
GetLocaleInfoA
GetStdHandle
GetCommState
SetCurrentDirectoryA
GetModuleFileNameA
CreateEventA
SetLastError
GetProcessHeap
lstrcpyW
FileTimeToLocalFileTime
lstrcpyW
VirtualAllocEx
lstrlenW
GetModuleHandleA
GetStartupInfoW
lstrcpyW
lstrcpyW
termmgr
DllRegisterServer
DllGetClassObject
DllCanUnloadNow
DllUnregisterServer
Sections
.text Size: 3KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 800KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Pdata Size: 512B - Virtual size: 284B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ