Static task
static1
Behavioral task
behavioral1
Sample
c3f281b348565becd3bf911115842317693892dbc30019b6f4b7c2e36b524d96.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c3f281b348565becd3bf911115842317693892dbc30019b6f4b7c2e36b524d96.exe
Resource
win10v2004-20220812-en
General
-
Target
c3f281b348565becd3bf911115842317693892dbc30019b6f4b7c2e36b524d96
-
Size
107KB
-
MD5
a3bee739111235c44d67abb6c9e369b6
-
SHA1
7b322f7ad8b43106a646297d319575655ab84194
-
SHA256
c3f281b348565becd3bf911115842317693892dbc30019b6f4b7c2e36b524d96
-
SHA512
6558af259cfbdf8d0c990966aa49d1070a5dd3a701c8bc3d4973e835b6087b0424527d27fa9e6357cdd69af90a4e0a0c6b4a57f6a85de40cc82b247f6b6cfb96
-
SSDEEP
3072:y8EE5iHmnKlX1M625hjuDxUa47fMv6w9PRfTw/xF:yv+VKzX9ZSf
Malware Config
Signatures
Files
-
c3f281b348565becd3bf911115842317693892dbc30019b6f4b7c2e36b524d96.exe windows x86
b496ff6f7a3596971eca54cc54a79354
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSetValueExA
RegQueryValueExA
RegEnumKeyExA
RegCloseKey
RegQueryInfoKeyA
RegOpenKeyExA
RegOverridePredefKey
RegOpenKeyA
kernel32
GetLocaleInfoA
lstrcmpiA
FindClose
FindNextFileA
FindFirstFileA
CloseHandle
GetLocalTime
WriteFile
lstrlenA
SetEndOfFile
SetFilePointer
GetFileSize
CreateFileA
GetDiskFreeSpaceA
GetLastError
CreateDirectoryA
SystemTimeToFileTime
GetSystemTime
DeleteFileA
lstrcmpA
TlsSetValue
TlsGetValue
ReleaseMutex
TlsFree
TlsAlloc
WaitForSingleObject
CreateMutexA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
GetProcAddress
GetModuleHandleA
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
HeapFree
GetACP
GetOEMCP
GetCPInfo
LoadLibraryA
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
InterlockedExchange
VirtualQuery
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
VirtualProtect
GetSystemInfo
IsDBCSLeadByteEx
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
lstrcpynA
SetUnhandledExceptionFilter
user32
SetFocus
CheckDlgButton
SetForegroundWindow
EndDialog
IsDlgButtonChecked
DialogBoxParamA
MessageBoxA
ShowWindow
CreateDialogParamA
GetDesktopWindow
IsDialogMessageA
TranslateMessage
PeekMessageA
LoadStringA
GetDlgItem
SendMessageA
SetDlgItemTextA
DestroyWindow
CharPrevA
SetWindowPos
OffsetRect
DispatchMessageA
SystemParametersInfoA
GetParent
GetWindowRect
comctl32
InitCommonControlsEx
shlwapi
wnsprintfA
StrFormatByteSize64A
ole32
CoInitialize
CoGetMalloc
CoUninitialize
CoCreateInstance
CoTaskMemRealloc
Sections
.text Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE