Static task
static1
Behavioral task
behavioral1
Sample
c3f333e0a1d3387b7699091ce850e0725175b54bd733d35cdb6bfcff0f335760.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c3f333e0a1d3387b7699091ce850e0725175b54bd733d35cdb6bfcff0f335760.exe
Resource
win10v2004-20220812-en
General
-
Target
c3f333e0a1d3387b7699091ce850e0725175b54bd733d35cdb6bfcff0f335760
-
Size
79KB
-
MD5
0453216bcb28d380d01840905377f406
-
SHA1
411d5479df66fce4528bc0a947940110dc7d0765
-
SHA256
c3f333e0a1d3387b7699091ce850e0725175b54bd733d35cdb6bfcff0f335760
-
SHA512
f45801efeda12f2a5c1df25ecd3c533ef23306906661655728ca9abcdfd6a1db889e59523b309a58bd9a308c17c65c88af256384aad11a140b2698a36d765e60
-
SSDEEP
1536:aELwYQuRFoJFFv3pNpEBK9Zg6z3snFOFFsQcXs:aj2RFo7FZz9Zg6z8FOFFsO
Malware Config
Signatures
Files
-
c3f333e0a1d3387b7699091ce850e0725175b54bd733d35cdb6bfcff0f335760.exe windows x86
3876c16cd1aef869b34f4e7f7f75c2d8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetWaitableTimer
DeleteFileA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
TerminateProcess
GetModuleHandleA
ExitProcess
HeapReAlloc
HeapFree
IsBadReadPtr
GetModuleFileNameA
LCMapStringA
CopyFileA
WriteFile
CreateWaitableTimerA
WaitForSingleObject
CreateProcessA
GetStartupInfoA
GetUserDefaultLCID
SetFilePointer
ReadFile
GetFileSize
FreeLibrary
GetProcAddress
LoadLibraryA
RtlFillMemory
HeapAlloc
GetProcessHeap
WideCharToMultiByte
MultiByteToWideChar
GetCurrentProcessId
GetVersion
CloseHandle
RtlMoveMemory
MapViewOfFile
CreateFileA
OpenFileMappingA
advapi32
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
RegOpenKeyA
wininet
HttpOpenRequestA
InternetSetCookieA
InternetCloseHandle
HttpQueryInfoA
InternetReadFile
HttpSendRequestA
InternetConnectA
InternetOpenA
user32
IsWindowVisible
GetWindowThreadProcessId
GetWindowTextA
EnumWindows
MsgWaitForMultipleObjects
SetTimer
wsprintfA
DispatchMessageA
MessageBoxA
GetClassNameA
PeekMessageA
GetMessageA
TranslateMessage
shell32
ShellExecuteA
msvcrt
_strnicmp
modf
strtod
realloc
strncpy
strchr
strncmp
atoi
toupper
sprintf
_stricmp
_ftol
??2@YAPAXI@Z
strrchr
??3@YAXPAX@Z
malloc
free
tolower
shlwapi
PathFileExistsA
ole32
CoUninitialize
OleRun
CoCreateInstance
CLSIDFromString
CoInitialize
CLSIDFromProgID
oleaut32
SafeArrayGetDim
VarR8FromCy
VarR8FromBool
LoadTypeLi
LHashValOfNameSys
RegisterTypeLi
SafeArrayCreate
SysAllocString
VariantClear
SafeArrayDestroy
SafeArrayGetElemsize
SafeArrayUnaccessData
VariantChangeType
VariantInit
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
Sections
Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 511B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE