Static task
static1
Behavioral task
behavioral1
Sample
3b3980755009884ded7bcc786159969cc8c1cda7ce83f868e0acccecc60b9dd0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3b3980755009884ded7bcc786159969cc8c1cda7ce83f868e0acccecc60b9dd0.exe
Resource
win10v2004-20220812-en
General
-
Target
3b3980755009884ded7bcc786159969cc8c1cda7ce83f868e0acccecc60b9dd0
-
Size
264KB
-
MD5
10a92426e2ad547358bd8506f38b80bd
-
SHA1
22103cf3c9607eedc2f34285364cab2a38b2ec0f
-
SHA256
3b3980755009884ded7bcc786159969cc8c1cda7ce83f868e0acccecc60b9dd0
-
SHA512
4256502f4540273eaed86f011a7588db3ff50dff31ad80399d6344bc38f0d0f5b411de6911029e2e0ba55e4c3143a55651e081aa113b54fd39ef5de6f3bc9d42
-
SSDEEP
3072:bpFD4LTlEoHwrbEB7kO8e3rbswGCOOLJLWHaetjPQS9S0I0vyGl+kp3onO:bTUnQrbEWLeUl4f0IG+kYO
Malware Config
Signatures
Files
-
3b3980755009884ded7bcc786159969cc8c1cda7ce83f868e0acccecc60b9dd0.exe windows x86
aeeebd546e72ac7d85cd9d635ee1b1a1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadResource
FindResourceExW
MapViewOfFile
UnmapViewOfFile
OpenEventW
GetFileAttributesW
OpenFileMappingW
SetLastError
SetEvent
LeaveCriticalSection
DeleteCriticalSection
EnterCriticalSection
GetLocalTime
InitializeCriticalSection
GetCurrentThreadId
CreateDirectoryW
WideCharToMultiByte
TerminateProcess
HeapFree
CreateProcessW
GetCurrentProcess
HeapAlloc
GetCurrentProcessId
GetProcessHeap
GetPrivateProfileStringW
WritePrivateProfileStringW
GetModuleFileNameW
ReadFile
CreateFileW
LockResource
SetEndOfFile
MultiByteToWideChar
SetEnvironmentVariableA
CompareStringW
CompareStringA
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoW
GetStringTypeW
GetStringTypeA
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetTickCount
QueryPerformanceCounter
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetTimeZoneInformation
GetStartupInfoA
GetFileType
SetHandleCount
GetDateFormatA
GetTimeFormatA
IsValidCodePage
SizeofResource
GetModuleHandleW
FindResourceW
Sleep
InterlockedExchange
InterlockedCompareExchange
CreateMutexW
GetCommandLineW
SetDllDirectoryW
CloseHandle
GetLastError
lstrcpynW
FreeLibrary
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
IsBadWritePtr
IsBadReadPtr
WriteFile
GetOEMCP
VirtualAlloc
VirtualFree
HeapCreate
FlushFileBuffers
GetConsoleMode
GetConsoleCP
SetFilePointer
LoadLibraryA
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleFileNameA
GetStdHandle
GetCPInfo
LCMapStringW
LCMapStringA
RtlUnwind
GetStartupInfoW
GetSystemTimeAsFileTime
IsDebuggerPresent
SetUnhandledExceptionFilter
RaiseException
GetVersionExA
HeapDestroy
HeapReAlloc
HeapSize
GetACP
GetLocaleInfoA
GetThreadLocale
InterlockedIncrement
InterlockedDecrement
GetModuleHandleA
ExitProcess
UnhandledExceptionFilter
user32
PostMessageW
DestroyMenu
RegisterWindowMessageW
CreateWindowExW
SetWindowLongW
TrackPopupMenu
GetCursorPos
GetSubMenu
LoadMenuW
LoadImageW
DestroyWindow
DispatchMessageW
TranslateMessage
GetMessageW
FindWindowA
SendMessageW
PostQuitMessage
SendMessageTimeoutW
FindWindowW
RegisterClassExW
CopyIcon
DefWindowProcW
CallWindowProcW
IsWindow
SetTimer
KillTimer
GetWindowLongW
UnregisterClassA
advapi32
RegCloseKey
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegOpenKeyExW
RegQueryValueExW
shell32
CommandLineToArgvW
Sections
.text Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE