Static task
static1
Behavioral task
behavioral1
Sample
3a7852abd1d15bd1ebc7ce12a3ca3763cebd068208edb4be9fb8a853f2815cee.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3a7852abd1d15bd1ebc7ce12a3ca3763cebd068208edb4be9fb8a853f2815cee.exe
Resource
win10v2004-20221111-en
General
-
Target
3a7852abd1d15bd1ebc7ce12a3ca3763cebd068208edb4be9fb8a853f2815cee
-
Size
124KB
-
MD5
4a91d9752f2272571db1f2fd2da196a0
-
SHA1
6c3c2ac4c7bf6c9a9c5c39f55905c7d0953e5352
-
SHA256
3a7852abd1d15bd1ebc7ce12a3ca3763cebd068208edb4be9fb8a853f2815cee
-
SHA512
bce49c53c39b8b8752ed5d25d744c294de84bf26ee52e7d5eea356da73125a7b32d43a7d2784c2a6fe45bd33108ae4eda15c4547eea0706d9149e558b297cea9
-
SSDEEP
3072:znm47p5CbSMSKi2RjYsslzm2zvitSS2vlsUg2:jV7p5Cbr/vp9slK0b2e
Malware Config
Signatures
Files
-
3a7852abd1d15bd1ebc7ce12a3ca3763cebd068208edb4be9fb8a853f2815cee.exe windows x86
72c93e79ef105545d74694c0793bc15d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
IMAGE_FILE_UP_SYSTEM_ONLY
Imports
kernel32
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
DeleteCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleFileNameA
HeapCreate
GetModuleFileNameW
GetStdHandle
WriteFile
DecodePointer
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoW
HeapSetInformation
GetCommandLineA
HeapAlloc
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapFree
RtlUnwind
HeapSize
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapReAlloc
GetCurrentProcessId
LoadLibraryW
IsBadReadPtr
GetProcessHeap
GetModuleHandleW
GetModuleHandleA
ExitProcess
GetProcAddress
SetLastError
GetLastError
CreateProcessA
Sleep
EncodePointer
IsProcessorFeaturePresent
user32
MapVirtualKeyW
RealChildWindowFromPoint
MapDialogRect
SendDlgItemMessageA
GetMessageTime
TranslateAcceleratorW
WinHelpW
EndDeferWindowPos
FindWindowA
DestroyMenu
GetWindowDC
IsChild
UnregisterClassW
CheckMenuItem
EnumDisplayMonitors
RegisterClipboardFormatW
BeginDeferWindowPos
GetKeyNameTextW
FindWindowExW
AppendMenuA
ShowOwnedPopups
IsZoomed
GetLastActivePopup
SetMenuItemBitmaps
CopyImage
AttachThreadInput
GetMenuStringW
FindWindowExA
FindWindowW
GetMenuCheckMarkDimensions
GetClassLongW
GetForegroundWindow
SetWindowContextHelpId
IsDialogMessageW
IntersectRect
BringWindowToTop
GetClassNameW
SendDlgItemMessageW
SetLayeredWindowAttributes
winspool.drv
EnumPrintersA
WritePrinter
EndDocPrinter
OpenPrinterA
ClosePrinter
StartPagePrinter
StartDocPrinterA
EndPagePrinter
wininet
ResumeSuspendedDownload
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ