Static task
static1
Behavioral task
behavioral1
Sample
37acc88ba777092c5a10e33497ff4d8fc313029d2fd00a491243da165da8e464.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
37acc88ba777092c5a10e33497ff4d8fc313029d2fd00a491243da165da8e464.exe
Resource
win10v2004-20220812-en
General
-
Target
37acc88ba777092c5a10e33497ff4d8fc313029d2fd00a491243da165da8e464
-
Size
168KB
-
MD5
44a2aff286b8f80d205e4ec67a9f3860
-
SHA1
871fbce67c3d5d825a2c48277e0c9ffde7254b2b
-
SHA256
37acc88ba777092c5a10e33497ff4d8fc313029d2fd00a491243da165da8e464
-
SHA512
443b487ef24b786a48c84d5691ca429041ab65783449953814ed8b8a33e42a5579a35eefda8f4c8dc350a93c36fb6bdbde4b27a5d2eca33c6fac5f4808657d6f
-
SSDEEP
3072:kZ32Lx6puYCkZxTSiLzVdiPfW+lazAANqle01Dvf7/Medf9/GCH:kJW0oaxVdiPfdazIBdf7390
Malware Config
Signatures
Files
-
37acc88ba777092c5a10e33497ff4d8fc313029d2fd00a491243da165da8e464.exe windows x86
0de33aee7bb0c66007294e24ec2b43a2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
SysAllocString
VariantClear
VariantCopy
SysStringByteLen
SysFreeString
user32
CharUpperW
CharPrevA
CharUpperA
CharNextA
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
_except_handler3
_beginthreadex
fprintf
memset
wcslen
wcsncmp
memcpy
fputc
fputs
fflush
fgetc
fclose
_iob
free
malloc
memmove
strlen
memcmp
_purecall
__CxxFrameHandler
_CxxThrowException
_isatty
_fileno
kernel32
GetProcessTimes
VirtualAlloc
VirtualFree
WaitForSingleObject
SetEvent
InitializeCriticalSection
MapViewOfFile
GetTickCount
UnmapViewOfFile
OpenEventA
GetStdHandle
GetSystemTime
SystemTimeToFileTime
FileTimeToDosDateTime
GetModuleHandleA
GlobalMemoryStatus
GetSystemInfo
FileTimeToSystemTime
CompareFileTime
GetProcAddress
GetCurrentProcess
SetEndOfFile
WriteFile
ReadFile
DeviceIoControl
SetFilePointer
GetFileSize
CreateFileA
FindNextFileW
FindNextFileA
FindFirstFileW
FindFirstFileA
FindClose
GetTempFileNameW
GetTempFileNameA
GetTempPathW
GetTempPathA
SearchPathW
SearchPathA
GetCurrentDirectoryW
SetConsoleCtrlHandler
FileTimeToLocalFileTime
GetCommandLineW
SetFileApisToOEM
GetVersionExA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
MultiByteToWideChar
WideCharToMultiByte
GetLastError
FreeLibrary
LoadLibraryExA
LoadLibraryA
AreFileApisANSI
GetModuleFileNameA
SetCurrentDirectoryW
LocalFree
FormatMessageA
FormatMessageW
GetWindowsDirectoryA
GetWindowsDirectoryW
CloseHandle
SetFileTime
CreateFileW
SetLastError
SetFileAttributesA
RemoveDirectoryA
MoveFileA
SetFileAttributesW
RemoveDirectoryW
MoveFileW
CreateDirectoryA
CreateDirectoryW
DeleteFileA
DeleteFileW
lstrlenA
GetFullPathNameA
GetFullPathNameW
GetCurrentDirectoryA
SetCurrentDirectoryA
OpenFileMappingA
Sections
.text Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 800B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
����uU Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE