Static task
static1
Behavioral task
behavioral1
Sample
3c10eee26353675a7b1480735419163968673ba62712413eb5f6838008f46a58.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3c10eee26353675a7b1480735419163968673ba62712413eb5f6838008f46a58.exe
Resource
win10v2004-20221111-en
General
-
Target
3c10eee26353675a7b1480735419163968673ba62712413eb5f6838008f46a58
-
Size
332KB
-
MD5
10b82186f0e8dcc2e4f9a8414a841e75
-
SHA1
41704d9eac6c29d884c25f6decf46eb8636f365c
-
SHA256
3c10eee26353675a7b1480735419163968673ba62712413eb5f6838008f46a58
-
SHA512
5b25b11be97b0e07f9fa8cb5900d5c2be084fc3f43997d797947c15236e35476dc204148a03dfdce71e4572dddae60ee29080cef11cef3bead67e17f1f373547
-
SSDEEP
6144:xRIBKnTwZ3nEdrwmROE6o5e794Tizyrr8KKKNMJqPKYUvAtwhGf:xRIcnTILmRf5Ugi0HNUqPKitwMf
Malware Config
Signatures
Files
-
3c10eee26353675a7b1480735419163968673ba62712413eb5f6838008f46a58.exe windows x86
12cf09b22b8673094fbb22743d220dd1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitMUILanguage
CreateToolbarEx
ImageList_LoadImageA
ImageList_Replace
InitCommonControlsEx
ImageList_Add
ImageList_Create
CreateStatusWindowA
ImageList_GetImageInfo
kernel32
FindResourceExA
EnterCriticalSection
LocalFree
LCMapStringW
GetUserDefaultLCID
HeapReAlloc
MultiByteToWideChar
UnhandledExceptionFilter
GetTimeZoneInformation
TlsFree
GetStartupInfoA
GetCurrentThread
GetSystemInfo
GetModuleFileNameA
RaiseException
GetCommandLineA
GetEnvironmentStringsW
GetCurrentProcess
FreeEnvironmentStringsA
FlushFileBuffers
GetVersionExA
GetStringTypeW
PulseEvent
CreateMutexA
VirtualUnlock
GetOEMCP
SetEnvironmentVariableA
GetLocaleInfoA
CloseHandle
GetSystemTimeAsFileTime
RemoveDirectoryA
GetLastError
GetStdHandle
DeleteCriticalSection
VirtualFree
HeapFree
GetEnvironmentStrings
GetCurrentThreadId
GetTimeFormatA
HeapAlloc
ExitProcess
HeapDestroy
GetProcAddress
WriteFile
SetLastError
RtlUnwind
SetStdHandle
InterlockedExchange
lstrcpynW
TlsGetValue
GetLocaleInfoW
WritePrivateProfileSectionW
CompareStringA
GetDriveTypeA
TlsAlloc
GetCurrentProcessId
GetVersion
HeapCreate
IsValidLocale
GetCPInfo
TlsSetValue
WideCharToMultiByte
GetFullPathNameA
QueryPerformanceCounter
CompareFileTime
VirtualQuery
LeaveCriticalSection
CreateWaitableTimerW
FreeEnvironmentStringsW
GetModuleHandleA
HeapSize
VirtualProtect
GetShortPathNameW
SetHandleCount
InitializeCriticalSection
LoadLibraryA
OpenMutexA
GetTickCount
GetACP
SetFilePointer
GetStringTypeA
LCMapStringA
CommConfigDialogW
CompareStringW
IsValidCodePage
EnumSystemLocalesA
GetFileType
FlushConsoleInputBuffer
VirtualAlloc
TerminateProcess
ReadFile
IsBadWritePtr
GetDateFormatA
shell32
DragQueryFile
SHInvokePrinterCommandA
DragQueryFileA
SHBrowseForFolderA
ShellExecuteA
comdlg32
LoadAlterBitmap
GetOpenFileNameA
PageSetupDlgW
ReplaceTextW
gdi32
GetTextCharset
PathToRegion
GetTextExtentPointA
GetCharWidth32W
CreateDIBitmap
GetBkColor
GetClipRgn
ResetDCA
GetEnhMetaFilePaletteEntries
CreateColorSpaceW
DeleteDC
ColorCorrectPalette
AddFontResourceA
GetDIBits
SetArcDirection
SetViewportExtEx
AbortPath
SetTextAlign
SetGraphicsMode
CreateMetaFileA
CreateScalableFontResourceA
user32
IsCharLowerA
LoadKeyboardLayoutA
RegisterClassA
GetMenuItemInfoW
SetDeskWallpaper
SetWindowPlacement
DefWindowProcA
ReleaseCapture
VkKeyScanExA
IsIconic
CreateMDIWindowA
GetMenuItemCount
ShowWindow
MessageBoxW
DdeGetData
SetCapture
SetUserObjectInformationW
ScrollDC
CreateWindowExA
DeleteMenu
DlgDirListA
AnimateWindow
GetMenuItemInfoA
RegisterClassExA
OemToCharBuffA
DestroyWindow
SetWindowTextA
GetWindowRect
SetWindowPos
SetMenuContextHelpId
SetMessageExtraInfo
Sections
.text Size: 144KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ