Static task
static1
Behavioral task
behavioral1
Sample
4c0be3f57601763a1c8be33b1d0ee18a6484f7a75fa1a336d30cdc32850748c3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4c0be3f57601763a1c8be33b1d0ee18a6484f7a75fa1a336d30cdc32850748c3.exe
Resource
win10v2004-20221111-en
General
-
Target
4c0be3f57601763a1c8be33b1d0ee18a6484f7a75fa1a336d30cdc32850748c3
-
Size
164KB
-
MD5
3b8b5d2e67bd848b62ad123077cf9050
-
SHA1
31c274b71557117f86927143a1d97a6be046685f
-
SHA256
4c0be3f57601763a1c8be33b1d0ee18a6484f7a75fa1a336d30cdc32850748c3
-
SHA512
26840f28e512e47350e635964130700c2a2cb45838bea2b9a45194d4b1ea339f46dd30a1a318fe1570bd9b510e56d443e6c1bc796136bd23581d8027b78fa570
-
SSDEEP
3072:PhG003wInY5Uz4/coCUR5IrCYNsG5d3drafA45Ym5v:PiAIY/55o1tra4jm
Malware Config
Signatures
Files
-
4c0be3f57601763a1c8be33b1d0ee18a6484f7a75fa1a336d30cdc32850748c3.exe windows x86
ba4fedf3f8f11c27ffbd2990eca0db9a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
i18n
?Open@CUResBundle@I18N@@QAE_NPBD0ABULOCALE@2@@Z
?GetItem@CUResBundle@I18N@@QAE_NPBDAAV?$TUString@D@2@@Z
?_free_memory@I18N@@YAXPAX@Z
??0CUResBundle@I18N@@QAE@XZ
??1CUResBundle@I18N@@QAE@XZ
mfc42
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord2985
ord4424
ord3738
ord815
ord561
ord924
ord537
ord2621
ord1134
ord1200
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord1168
ord5307
ord4698
ord4079
ord2725
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord860
ord5683
ord4129
ord858
ord800
ord4274
ord4673
ord1175
ord823
ord825
ord1576
ord4622
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
strncpy
wcstombs
_access
_mbschr
_mkdir
_snprintf
time
localtime
__p___argc
_mbsicmp
_mbsstr
_stricmp
__p___argv
_setmbcp
rand
_mbsrchr
_vsnprintf
_mbslwr
_mbsnbcat
_mbsnbcpy
__CxxFrameHandler
strtok
kernel32
GetPrivateProfileStringA
CloseHandle
Module32Next
Module32First
CreateToolhelp32Snapshot
GetCurrentProcessId
InterlockedDecrement
GetLastError
GetProcAddress
GetModuleHandleA
OutputDebugStringA
GetShortPathNameA
FreeLibrary
MultiByteToWideChar
SetEndOfFile
WriteFile
ReadFile
SetFilePointer
CreateFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
GetProcessTimes
GetCurrentProcess
GetCurrentThreadId
GetStartupInfoA
InterlockedIncrement
CreateEventA
WaitForSingleObject
CreateThread
SetLastError
ConvertDefaultLocale
LoadLibraryA
GetModuleFileNameA
user32
DefWindowProcA
UnregisterClassA
RegisterClassA
CreateWindowExA
SetWindowLongA
DestroyWindow
IsWindow
PostMessageA
PostQuitMessage
MessageBoxA
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyExA
RegCloseKey
RegDeleteKeyA
RegSetValueExA
ole32
CoTaskMemFree
CoInitialize
CoUninitialize
CLSIDFromString
CoRevokeClassObject
CoRegisterClassObject
CoDisconnectObject
StringFromCLSID
gdiplus
GdiplusStartup
GdiplusShutdown
ws2_32
htonl
ntohl
Sections
.text Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
q=� Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE