Static task
static1
Behavioral task
behavioral1
Sample
3d9f6ff88fc9e10db93508e0b6e1419f40c1cb837c26beaaab502ef713f9a087.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3d9f6ff88fc9e10db93508e0b6e1419f40c1cb837c26beaaab502ef713f9a087.exe
Resource
win10v2004-20220812-en
General
-
Target
3d9f6ff88fc9e10db93508e0b6e1419f40c1cb837c26beaaab502ef713f9a087
-
Size
237KB
-
MD5
a291e74bd3a30ccf4d834d9ca1ef28a0
-
SHA1
db5b4282734b7153f9d6ae6a7989e1e4079437ef
-
SHA256
3d9f6ff88fc9e10db93508e0b6e1419f40c1cb837c26beaaab502ef713f9a087
-
SHA512
bf6730b1b4eee78142ffe5ef78c424f3e2286c84e034fa323ecf1657e3f848ea1deff00f4546ce6fcebc4531cb0058a6540ebb7350705dd8e23a95ab9dc0f1ed
-
SSDEEP
6144:ecCSTy+xOcsU+ngAwrr9IC7bvresv5c0ViZ:ecr5bNFIC7bTBR5V
Malware Config
Signatures
Files
-
3d9f6ff88fc9e10db93508e0b6e1419f40c1cb837c26beaaab502ef713f9a087.exe windows x86
66cb0c3fcf1c36af020f982824cad89b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlZeroMemory
NtSetInformationProcess
kernel32
GetLastError
GetProcAddress
EnterCriticalSection
LoadLibraryA
LocalAlloc
InitializeCriticalSection
CreateThread
lstrcpyA
SwitchToThread
GetProcessHeap
WaitForSingleObject
HeapFree
HeapAlloc
ExitProcess
RaiseException
TerminateProcess
LeaveCriticalSection
GetVolumeInformationW
Sleep
FreeLibrary
InterlockedExchange
comctl32
ord17
iphlpapi
GetAdaptersInfo
secur32
LsaFreeReturnBuffer
Sections
.text Size: 232KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE