Static task
static1
Behavioral task
behavioral1
Sample
37d8c494ee631372e98fb824e889cdece2d833057b56b617829d0d88af03a133.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
37d8c494ee631372e98fb824e889cdece2d833057b56b617829d0d88af03a133.exe
Resource
win10v2004-20220812-en
General
-
Target
37d8c494ee631372e98fb824e889cdece2d833057b56b617829d0d88af03a133
-
Size
4.3MB
-
MD5
c00227c59f00474c19bec61d36e74be2
-
SHA1
790bb52e3071bbd9e08e910d283cb36dbbf601a8
-
SHA256
37d8c494ee631372e98fb824e889cdece2d833057b56b617829d0d88af03a133
-
SHA512
39ff5c0b6a43fd7d52c175ca2950a3c585d6e4c2e1debc904cccc2e623bd3796b0767cfcf87118bf5d14a791939cd8a5e31e7ae26ab51be8b2bd9c0ef3cf880a
-
SSDEEP
49152:7SuK4jZ0WHCpNqLmxup4udGKvghxfki1pNc7SKPB+lyzEJ3jdr:22Z0NvqEKcfG7SKwYiTd
Malware Config
Signatures
Files
-
37d8c494ee631372e98fb824e889cdece2d833057b56b617829d0d88af03a133.exe windows x86
39228d1d228f54cebd3bf9d13ef87302
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObjectEx
GetFileAttributesA
GetCurrentProcess
WideCharToMultiByte
MultiByteToWideChar
HeapAlloc
HeapFree
CreateMutexA
GetModuleHandleExW
Sleep
GetLastError
GetProcessHeap
InterlockedCompareExchange
SetLastError
GetVersionExA
GetModuleHandleA
HeapReAlloc
LeaveCriticalSection
DisableThreadLibraryCalls
CreateFileW
VirtualAlloc
VirtualFree
GetTempPathA
GetProcAddress
LoadLibraryA
RemoveDirectoryA
EnterCriticalSection
CloseHandle
GetCurrentThreadId
LocalFileTimeToFileTime
ReadFile
GetTickCount
ExitProcess
WriteConsoleW
GetConsoleCP
FlushFileBuffers
SetStdHandle
LoadLibraryW
OutputDebugStringW
LCMapStringW
LoadLibraryExW
GetModuleHandleW
TlsFree
TlsSetValue
SetEndOfFile
TlsGetValue
TlsAlloc
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
GetSystemTimeAsFileTime
RtlUnwind
GetCommandLineA
InterlockedDecrement
AreFileApisANSI
HeapSize
IsDebuggerPresent
InterlockedIncrement
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
RaiseException
GetStdHandle
WriteFile
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
SetFilePointer
SetFilePointerEx
GetConsoleMode
ReadConsoleW
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetStringTypeW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
advapi32
RegEnumKeyExW
RegEnumKeyW
RegCreateKeyExW
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegQueryValueExW
RegCreateKeyExA
RegOpenKeyW
RegEnumKeyExA
user32
GetWindowRect
CreateWindowExW
GetClientRect
GetWindowTextW
RegisterClassExA
RegisterWindowMessageA
SetWindowPos
PostQuitMessage
RegisterClassExW
PeekMessageA
MsgWaitForMultipleObjects
CreateWindowExA
RedrawWindow
SetForegroundWindow
PostMessageW
SendMessageA
DefWindowProcA
RegisterWindowMessageW
MessageBoxW
SendMessageW
TrackPopupMenu
ShowWindow
UpdateWindow
FindWindowW
GetParent
LoadIconW
PostMessageA
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2.9MB - Virtual size: 2.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 78KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ