Static task
static1
Behavioral task
behavioral1
Sample
3a7631ad5aa0cea9b40d11beea529abefb005d605743e910a843cb25bf54812e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3a7631ad5aa0cea9b40d11beea529abefb005d605743e910a843cb25bf54812e.exe
Resource
win10v2004-20220901-en
General
-
Target
3a7631ad5aa0cea9b40d11beea529abefb005d605743e910a843cb25bf54812e
-
Size
100KB
-
MD5
84fde5425f24b9ace150c9e40f4c7afe
-
SHA1
329508fdd0d4232b9c4585fba4474ea93439e5f3
-
SHA256
3a7631ad5aa0cea9b40d11beea529abefb005d605743e910a843cb25bf54812e
-
SHA512
b1dddc16aa1fcb98fabe927beac6b7830e857ef4b384b4cadd1a8cf8a23b2a285156d610d86e6cd4f9371798366ce0e3e94f174e4cf9b78dd76f208df45edbbc
-
SSDEEP
1536:aBjZfb3iOKxGMEYBt5ih3XV4jXphiH7Uupa3BHosMg:a6WqPiY9Ubw3BHosMg
Malware Config
Signatures
Files
-
3a7631ad5aa0cea9b40d11beea529abefb005d605743e910a843cb25bf54812e.exe windows x86
faef16d218bca061c85b3aabd4087fcc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
GetFileAttributesA
GetModuleFileNameA
MultiByteToWideChar
GetThreadPriority
GetFileType
GetProcessVersion
CreateThread
HeapAlloc
OpenProcess
HeapFree
SetLastError
GetProcAddress
CreateFileA
GetComputerNameA
Process32Next
GetCurrentProcess
GetSystemDefaultLCID
LoadLibraryA
GetShortPathNameA
GetModuleHandleA
CloseHandle
GetProcessHeap
GetOEMCP
GetACP
GetCPInfo
SetStdHandle
IsBadCodePtr
IsBadReadPtr
LCMapStringW
LCMapStringA
GetLastError
GetFileSize
Sleep
GetCurrentThreadId
FindClose
SetErrorMode
GetCurrentThread
GetTickCount
CreateToolhelp32Snapshot
GetStringTypeW
GetStringTypeA
RtlUnwind
GetCommandLineA
GetVersion
ExitProcess
RaiseException
TerminateProcess
HeapReAlloc
HeapSize
ReadFile
SetFilePointer
SetHandleCount
GetStdHandle
GetStartupInfoA
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
FlushFileBuffers
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
SetEndOfFile
user32
GetWindowLongA
GetMessageA
GetWindowRect
GetActiveWindow
GetForegroundWindow
GetClassLongA
GetWindow
GetDesktopWindow
advapi32
StartServiceA
OpenProcessToken
SetServiceStatus
ControlService
DeleteService
CreateServiceA
CloseServiceHandle
OpenSCManagerW
shell32
ShellExecuteExW
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ