Static task
static1
Behavioral task
behavioral1
Sample
3636fd25085c48f58ae8382a24091c71f13893475b127aabcd56bdeeedc0302e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3636fd25085c48f58ae8382a24091c71f13893475b127aabcd56bdeeedc0302e.exe
Resource
win10v2004-20220812-en
General
-
Target
3636fd25085c48f58ae8382a24091c71f13893475b127aabcd56bdeeedc0302e
-
Size
500KB
-
MD5
0cc676257a5a9784fc24172557937d6d
-
SHA1
5d064c39cfc9fb9f16f45653dd2c3387da30028e
-
SHA256
3636fd25085c48f58ae8382a24091c71f13893475b127aabcd56bdeeedc0302e
-
SHA512
ea33d9b8a66b05fdf1a8adc8170cbc28aa5fa96e8b658dd74c3684100f419a451def482cd151dcc5cd1fa765f92fa3da992cf1e17a197f2cc41e16a7fc65b197
-
SSDEEP
12288:UPQVw6fnWdnX1ktVWcuAiVqUrxdOzjZ9OvGxFZi5L6Bgc5SPLEpM:UPQV3WlX1egl6jZ9OvGZiQyc5SPLEp
Malware Config
Signatures
Files
-
3636fd25085c48f58ae8382a24091c71f13893475b127aabcd56bdeeedc0302e.exe windows x86
9af200d3574ee6b9a7196f49cab7c4dd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CreateWindowExA
AnimateWindow
RegisterWindowMessageA
OpenDesktopW
LoadStringA
GetClipboardSequenceNumber
CopyIcon
GetCursorInfo
RegisterClassA
CharLowerBuffW
RegisterClassExA
ShowWindow
MessageBoxA
CreateAcceleratorTableA
GetClassWord
DdeConnectList
SubtractRect
ScreenToClient
GetUpdateRgn
DdeFreeDataHandle
ChangeDisplaySettingsA
GetPropW
comctl32
InitCommonControlsEx
kernel32
VirtualQuery
GetVersion
GlobalUnfix
GetCurrentThread
GetStringTypeA
HeapSize
CompareStringA
CloseHandle
GetCommandLineW
GetTickCount
GetCPInfo
CreateMutexA
ExitProcess
GetModuleHandleA
GetSystemTimeAsFileTime
InterlockedIncrement
GetCurrentProcess
GetCurrentThreadId
GetModuleFileNameA
LeaveCriticalSection
InitializeCriticalSection
GetCompressedFileSizeA
GetEnvironmentStringsW
ReadFile
OpenMutexA
GetFileType
SetFilePointer
FreeEnvironmentStringsW
LoadLibraryA
TlsSetValue
GetSystemTime
TlsFree
FreeEnvironmentStringsA
SetStdHandle
GetLocalTime
HeapFree
GetStartupInfoW
HeapCreate
LCMapStringW
RtlUnwind
IsBadWritePtr
WriteFile
GetTimeZoneInformation
VirtualFree
GetStartupInfoA
HeapReAlloc
DeleteCriticalSection
CompareStringW
lstrcpy
GetCurrentProcessId
GetCommandLineA
SetHandleCount
QueryPerformanceCounter
TlsAlloc
GetStringTypeW
TlsGetValue
GetStdHandle
GetEnvironmentStrings
HeapAlloc
GetLastError
InterlockedDecrement
TerminateProcess
ExpandEnvironmentStringsW
WideCharToMultiByte
GetProcAddress
InterlockedExchange
MultiByteToWideChar
GetModuleFileNameW
HeapDestroy
EnterCriticalSection
VirtualAlloc
SetLastError
FlushFileBuffers
SetEnvironmentVariableA
LCMapStringA
UnhandledExceptionFilter
comdlg32
PageSetupDlgW
PageSetupDlgA
GetFileTitleW
FindTextW
gdi32
CloseEnhMetaFile
AbortPath
PlayEnhMetaFile
GetEnhMetaFileA
CreateDIBitmap
StartDocW
FixBrushOrgEx
SetViewportExtEx
shell32
RealShellExecuteA
SHGetInstanceExplorer
SHGetMalloc
SHFileOperationA
Sections
.text Size: 354KB - Virtual size: 354KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ