Static task
static1
Behavioral task
behavioral1
Sample
3f812a92136133336a7d89465aad4ae416ab47d109187f660835aa5cf5b1f08c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3f812a92136133336a7d89465aad4ae416ab47d109187f660835aa5cf5b1f08c.exe
Resource
win10v2004-20220812-en
General
-
Target
3f812a92136133336a7d89465aad4ae416ab47d109187f660835aa5cf5b1f08c
-
Size
228KB
-
MD5
1734f460205f993c3f8382a50b4a9f77
-
SHA1
ed9e50fa76be0bbdf6c2c458af2b7714a36c30f2
-
SHA256
3f812a92136133336a7d89465aad4ae416ab47d109187f660835aa5cf5b1f08c
-
SHA512
90f517431205084ee38589673ca5b68b17a830e969d1b4701aee6f8c7416c7974a6623306228ad834713eb1c6515a34dbf941fb6cff562ecf03718e07c900a9f
-
SSDEEP
3072:9Btrqne+0JcPF1cK1nu5cdUfv+BCpS7syO1JkBCSWm9zJZaJJWlRgA1:9Btrqne+VPF1nCS7syoEzJwJQRgA1
Malware Config
Signatures
Files
-
3f812a92136133336a7d89465aad4ae416ab47d109187f660835aa5cf5b1f08c.exe windows x86
7e1109a9b2491472f870de6144316722
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTimeFormatA
WaitForSingleObject
CreateProcessA
SetEvent
SetFileAttributesA
CloseHandle
GetDateFormatA
GetLocalTime
GetStartupInfoA
GetFileAttributesA
GetVolumeInformationA
GetModuleFileNameA
CreateEventA
LeaveCriticalSection
ResetEvent
FreeLibrary
LoadLibraryA
GetProcAddress
IsBadWritePtr
DeleteCriticalSection
InitializeCriticalSection
CreateFileA
DeleteFileA
GetModuleHandleA
GetLastError
SearchPathA
GetCurrentProcess
GetSystemDirectoryA
GetVersionExA
GetUserDefaultLangID
lstrcmpiA
GetDriveTypeA
QueryDosDeviceA
EnterCriticalSection
DeviceIoControl
user32
LoadStringA
wsprintfA
ExitWindowsEx
EndDialog
EnableWindow
CheckDlgButton
DialogBoxParamA
IsDlgButtonChecked
ShowWindow
SetWindowPos
MessageBoxA
GetDlgItem
SetWindowTextA
advapi32
RegDeleteKeyA
OpenProcessToken
AdjustTokenPrivileges
RegEnumKeyA
LookupPrivilegeValueA
RegEnumKeyExA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
shell32
ShellExecuteExA
comdlg32
GetOpenFileNameA
msvcrt
free
??1type_info@@UAE@XZ
__dllonexit
toupper
_strnicmp
_except_handler3
_stricmp
strlen
_controlfp
memset
strcpy
malloc
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
strcat
strrchr
strstr
strcmp
strchr
_itoa
_splitpath
atoi
_exit
_onexit
strncmp
_purecall
strncpy
strtok
exit
_acmdln
__p__fmode
__set_app_type
_XcptFilter
_adjust_fdiv
__getmainargs
_initterm
__setusermatherr
__p__commode
winmm
timeGetTime
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE