Static task
static1
Behavioral task
behavioral1
Sample
39c889779415d65a6e9916b019e6a0e93ff24289f97b510a41b0d3a90c0de944.exe
Resource
win7-20221111-en
General
-
Target
39c889779415d65a6e9916b019e6a0e93ff24289f97b510a41b0d3a90c0de944
-
Size
184KB
-
MD5
20f221562039f0ddd3ed832a35769643
-
SHA1
106d8098010c4e3f955579692abe4e41490466a9
-
SHA256
39c889779415d65a6e9916b019e6a0e93ff24289f97b510a41b0d3a90c0de944
-
SHA512
a8d5a1bb95c4c298ab3c7b01d1161649085825412de0686ed5ae50b83c39db8afaf0b37d068af9b524e1649290437182da651c5341d0180263cb5ca81a5d3f3a
-
SSDEEP
1536:xTH6xygMonhVBPvo0+PNyAqvlFETnCBgTWlpCDnnm9oTTafp3UTStP/Gctk7j6Ki:5axyecyAslbKmB1UetPuc9xdXMK8b0
Malware Config
Signatures
Files
-
39c889779415d65a6e9916b019e6a0e93ff24289f97b510a41b0d3a90c0de944.exe windows x86
8d691eed9206c0d1a9a9755517703603
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempFileNameA
GetTempPathA
DeleteFileA
InterlockedDecrement
GetModuleFileNameA
GetComputerNameA
InterlockedExchange
MultiByteToWideChar
GetLastError
lstrlenA
GetOEMCP
InterlockedIncrement
SetEndOfFile
LoadLibraryA
CopyFileA
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapCreate
VirtualFree
ExitProcess
Sleep
CloseHandle
SetFilePointer
GetFileType
WideCharToMultiByte
FindResourceExA
FindResourceA
LoadResource
LockResource
CreateFileA
SizeofResource
GetStdHandle
SetHandleCount
ReadFile
GetConsoleMode
GetConsoleCP
WriteFile
GetCurrentThreadId
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RaiseException
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
RtlUnwind
VirtualAlloc
GetProcAddress
GetModuleHandleA
IsValidCodePage
user32
SetCursor
EndPaint
UnregisterClassA
DrawTextA
GetClientRect
BeginPaint
DialogBoxParamA
DestroyWindow
DefWindowProcA
PostQuitMessage
SetWindowPos
GetWindowRect
LoadStringA
CreateWindowExA
SetTimer
GetWindowLongA
GetDC
EqualRect
UpdateLayeredWindow
SetWindowLongA
GetCursorPos
SetCapture
EndDialog
MoveWindow
GetWindowDC
ReleaseDC
ReleaseCapture
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
PostMessageA
LoadIconA
LoadCursorA
RegisterClassExA
gdi32
CreateDIBSection
SelectObject
GetDeviceCaps
DeleteDC
DeleteObject
CreateCompatibleDC
ole32
OleUninitialize
OleInitialize
OleDraw
OleRun
CoCreateInstance
OleSetContainedObject
OleCreate
oleaut32
VariantClear
VariantChangeType
VariantCopy
VariantInit
SysFreeString
SysStringLen
SysAllocString
GetErrorInfo
pdh
PdhCollectQueryData
PdhAddCounterA
PdhOpenQueryA
PdhCloseQuery
PdhRemoveCounter
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rmnet Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE