Static task
static1
Behavioral task
behavioral1
Sample
41209b347fb3f42c4a050cd16f05ba341342954254fe63727a96357c1c22c474.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
41209b347fb3f42c4a050cd16f05ba341342954254fe63727a96357c1c22c474.exe
Resource
win10v2004-20220901-en
General
-
Target
41209b347fb3f42c4a050cd16f05ba341342954254fe63727a96357c1c22c474
-
Size
104KB
-
MD5
36389f4719e0491b4ad8d44fdbc5a958
-
SHA1
aab4b82613667699b1863492dee385d30c8e0f29
-
SHA256
41209b347fb3f42c4a050cd16f05ba341342954254fe63727a96357c1c22c474
-
SHA512
0684c33fbca773383c06df4c09a5c3f361c000abb681f8b26313f15f851fc8a66d73edf95d3978171a6564fecd9d7f89e0b013222df16cbd85215899ac196757
-
SSDEEP
1536:tt0Ht3T9LJCxVwpnA6muZwEr0pzozZ5n5Z2+iNFoCWd:tqN3G6AS/jNV++iNFoCWd
Malware Config
Signatures
Files
-
41209b347fb3f42c4a050cd16f05ba341342954254fe63727a96357c1c22c474.exe windows x86
e3dd90d932fc0130a861e1913e7bff1e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
HeapAlloc
GetProcessHeap
GetLastError
SetLastError
OpenProcess
LoadLibraryA
GetProcAddress
GetModuleHandleA
CloseHandle
GetTickCount
Process32First
CreateToolhelp32Snapshot
GetCurrentProcessId
GetCurrentDirectoryA
GetComputerNameA
GetOEMCP
GetACP
GetCPInfo
MultiByteToWideChar
GetCurrentThread
GetSystemDefaultLangID
GetModuleFileNameA
SetErrorMode
GetCurrentProcess
Process32Next
GetCurrentThreadId
CreateFileA
SetStdHandle
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
RtlUnwind
Sleep
GetCommandLineA
GetVersion
ExitProcess
RaiseException
HeapFree
TerminateProcess
HeapReAlloc
HeapSize
ReadFile
SetFilePointer
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
FlushFileBuffers
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
IsBadReadPtr
IsBadCodePtr
SetEndOfFile
user32
GetForegroundWindow
GetParent
GetWindowLongA
advapi32
DuplicateTokenEx
SetServiceStatus
StartServiceCtrlDispatcherA
StartServiceA
ControlService
CloseServiceHandle
OpenProcessToken
shell32
ShellExecuteExW
oleaut32
SysAllocStringLen
SysFreeString
GetErrorInfo
Sections
.text Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 994KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ