Static task
static1
Behavioral task
behavioral1
Sample
3a6116adcda90bff17a3ecc26a9e6e7fb1ffae559a878d63d7b4a71a52fbaec3.exe
Resource
win7-20220812-en
General
-
Target
3a6116adcda90bff17a3ecc26a9e6e7fb1ffae559a878d63d7b4a71a52fbaec3
-
Size
330KB
-
MD5
03286205a052dd69ec7f04d6e21ca8d3
-
SHA1
a32cf7c23d5b96ebf89ef2c8f2389733b9e94505
-
SHA256
3a6116adcda90bff17a3ecc26a9e6e7fb1ffae559a878d63d7b4a71a52fbaec3
-
SHA512
bad65a12dae25e6f942162513bea9a2f685058fdf1bba8a3e554f16098f36c12d659f499a8160f8bb37d2fddf22790385fe3025de01bdbd05320cedfe00765c4
-
SSDEEP
6144:rXiCA9rho7H5O4kIp42amCfoOsCXdDXpVQmuCmqzIubb1l/:rXiCA9kH52242pCWCXdDXp2MzIi5Z
Malware Config
Signatures
Files
-
3a6116adcda90bff17a3ecc26a9e6e7fb1ffae559a878d63d7b4a71a52fbaec3.exe windows x86
776936c154d35c96a366bb33f4284717
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileW
CreateDirectoryA
GetCurrentProcess
GetModuleFileNameA
MultiByteToWideChar
GetVersionExA
FindResourceA
FreeLibrary
ExpandEnvironmentStringsA
LoadLibraryA
LoadLibraryExA
CompareStringA
WideCharToMultiByte
IsDBCSLeadByte
GetCPInfo
GetCurrentDirectoryA
CopyFileA
GetEnvironmentVariableA
CreateProcessA
GetTempPathA
WritePrivateProfileStringA
GetShortPathNameA
GetWindowsDirectoryA
MoveFileExA
RemoveDirectoryA
SetCurrentDirectoryA
Sleep
DeleteFileA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
RtlUnwind
GetConsoleMode
GetConsoleCP
HeapSize
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
InitializeCriticalSectionAndSpinCount
GetVersion
SetHandleCount
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
ExitProcess
MoveFileA
SetFileAttributesA
GetFileAttributesW
GetFileAttributesA
GetModuleHandleA
GetProcAddress
WriteFile
SetLastError
GetStdHandle
ReadFile
CreateFileW
CreateFileA
GetFileType
SetEndOfFile
SetFilePointer
GetLastError
FlushFileBuffers
GetProcessHeap
CloseHandle
GetModuleHandleW
HeapCreate
VirtualAlloc
VirtualFree
DeleteCriticalSection
GetStartupInfoA
GetCommandLineA
HeapReAlloc
LeaveCriticalSection
RaiseException
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
SetStdHandle
EnterCriticalSection
user32
GetDlgItem
EnableWindow
ReleaseDC
LoadIconA
MessageBoxA
SetForegroundWindow
GetSysColor
SendDlgItemMessageA
SetDlgItemTextA
GetDC
LoadStringA
GetWindowRect
GetClientRect
SetWindowPos
GetWindowTextA
SetWindowTextA
GetSystemMetrics
GetWindow
GetClassNameA
GetWindowLongA
SetWindowLongA
DialogBoxParamA
EndDialog
CheckDlgButton
IsDlgButtonChecked
GetParent
SendMessageA
InvalidateRect
gdi32
CreateFontA
DeleteObject
GetDeviceCaps
advapi32
RegSetValueExA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
SHChangeNotify
SHFileOperationA
ole32
OleUninitialize
OleInitialize
CoCreateInstance
Sections
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.lrdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
PACK Size: 144KB - Virtual size: 380KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE