Static task
static1
Behavioral task
behavioral1
Sample
3e24cc3f5518ca85391ed69379b564108e47fadc8fef48466161fa05984ae055.exe
Resource
win7-20220812-en
General
-
Target
3e24cc3f5518ca85391ed69379b564108e47fadc8fef48466161fa05984ae055
-
Size
668KB
-
MD5
0745db38d520b942d4adf2dbf873d181
-
SHA1
96e7619614f50948e51b08b120bf5fbe0bca64dc
-
SHA256
3e24cc3f5518ca85391ed69379b564108e47fadc8fef48466161fa05984ae055
-
SHA512
5da1156829300be05d9a0ec154c2ea8e8eca884118f1e2a292276bf5daa3c8b9a73e4f65663f4d63dc1caa29795735501e3f4a98fe1ee53d6c38954fb68a36c2
-
SSDEEP
12288:xXtyhdQ7Dc/Eod8Wb49yNLY3A6KFylZwq7cKcwYRyHFZlx15vKpOmMp:5tyDsDatb49yNU3XWscKcwYkT/iA
Malware Config
Signatures
Files
-
3e24cc3f5518ca85391ed69379b564108e47fadc8fef48466161fa05984ae055.exe windows x86
0150df3e258c922fa1404564248a0cd0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
ntohl
kernel32
OpenProcess
WaitForSingleObject
GetProcAddress
WideCharToMultiByte
CloseHandle
DeleteFileW
GetModuleHandleA
CreateProcessW
Sleep
CopyFileW
GetPrivateProfileStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetLocaleInfoW
GetTimeZoneInformation
GetConsoleOutputCP
WriteConsoleA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidCodePage
GetModuleHandleW
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetCommandLineW
GetCommandLineA
GetEnvironmentStrings
FreeEnvironmentStringsA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetEnvironmentVariableA
LCMapStringW
LCMapStringA
GetFullPathNameW
LoadLibraryW
OutputDebugStringW
WriteConsoleW
OutputDebugStringA
DebugBreak
CompareStringA
MultiByteToWideChar
CompareStringW
IsValidLocale
GetFileAttributesW
RaiseException
CreateFileW
HeapValidate
IsBadReadPtr
EnterCriticalSection
LeaveCriticalSection
GetLastError
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
GetFileType
CreateFileA
InterlockedIncrement
InterlockedDecrement
ExitProcess
GetFileInformationByHandle
PeekNamedPipe
GetModuleFileNameW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetDriveTypeW
FindFirstFileW
SetFileAttributesW
CreateThread
GetCurrentThreadId
ExitThread
SetEnvironmentVariableW
GetCurrentDirectoryW
SetCurrentDirectoryW
CreateDirectoryW
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
DeleteCriticalSection
FatalAppExitA
GetModuleFileNameA
HeapReAlloc
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
GetACP
GetOEMCP
GetCPInfo
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
WriteFile
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetStartupInfoA
SetFilePointer
GetCurrentDirectoryA
RtlUnwind
ReadFile
SetStdHandle
SetEndOfFile
FlushFileBuffers
LoadLibraryA
InitializeCriticalSection
user32
FindWindowA
GetWindowThreadProcessId
LoadIconW
KillTimer
OffsetRect
DestroyWindow
CallWindowProcW
GetMessageW
ShowWindow
CopyRect
GetDlgItem
SendMessageW
InvalidateRect
PostQuitMessage
TranslateMessage
CreateDialogParamW
GetWindowLongW
SetWindowLongW
EndDialog
SetTimer
GetClientRect
UpdateWindow
GetWindowRect
EnableWindow
LoadImageW
GetDesktopWindow
DispatchMessageW
SetWindowPos
CreateWindowExW
SetWindowTextW
gdi32
DeleteObject
advapi32
DuplicateTokenEx
OpenProcessToken
shell32
ShellExecuteW
Sections
.text Size: 288KB - Virtual size: 286KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 300KB - Virtual size: 300KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE