Static task
static1
Behavioral task
behavioral1
Sample
3d5101c8fd4263db3cfb4f4076507a57c4a2a9d23546dfe53331e542a4da1a0b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3d5101c8fd4263db3cfb4f4076507a57c4a2a9d23546dfe53331e542a4da1a0b.exe
Resource
win10v2004-20220812-en
General
-
Target
3d5101c8fd4263db3cfb4f4076507a57c4a2a9d23546dfe53331e542a4da1a0b
-
Size
50KB
-
MD5
a66af041c2de1cc1005a27987f6a2adb
-
SHA1
d18bd7b0b250f2faedbec494358bccb9952c98ea
-
SHA256
3d5101c8fd4263db3cfb4f4076507a57c4a2a9d23546dfe53331e542a4da1a0b
-
SHA512
279e525fedbe732c949d401714989388b842863cde3928e228d228d9146b0cd6f17f82440431c1385071c5f0e804a6a23d97d6dd20f62ddf06f0b2ec2684cec7
-
SSDEEP
768:rK+do4CrsI6/csHOw+rH545WekFEquL6lq8akhmTVliuwmdS2:rKPuOwoZ45c9QhTVE1m
Malware Config
Signatures
Files
-
3d5101c8fd4263db3cfb4f4076507a57c4a2a9d23546dfe53331e542a4da1a0b.exe windows x86
96e8f83e121e28b5c8cce7c347cfce41
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueA
InitializeSid
RegCloseKey
IsTextUnicode
RegDeleteValueA
IsValidSid
RegEnumValueA
RegFlushKey
IsValidAcl
ClearEventLogA
RegCreateKeyA
CreateServiceA
RegEnumKeyA
IsValidSecurityDescriptor
ControlService
certcli
CAEnumFirstCA
CACloseCA
CACloseCertType
CADeleteCA
shlwapi
UrlIsA
UrlCreateFromPathA
UrlHashA
UrlEscapeA
UrlCombineA
UrlCompareA
PathCommonPrefixA
UrlUnescapeA
UrlIsNoHistoryW
PathCombineA
PathCompactPathA
msimg32
GradientFill
vSetDdrawflag
TransparentBlt
DllInitialize
wtsapi32
WTSVirtualChannelWrite
WTSLogoffSession
WTSQueryUserToken
WTSSetUserConfigW
WTSVirtualChannelOpen
WTSFreeMemory
WTSVirtualChannelPurgeInput
WTSQuerySessionInformationA
WTSOpenServerW
WTSEnumerateServersA
WTSVirtualChannelClose
kernel32
GetGeoInfoA
GetPrivateProfileIntA
SetFilePointer
GetDateFormatA
GetPrivateProfileStructW
GetSystemTimeAsFileTime
CreateDirectoryA
CreateNamedPipeA
ReadConsoleA
VirtualAlloc
WriteConsoleA
ReadFile
GetProcessId
DeviceIoControl
CompareStringA
GetCurrentDirectoryA
FormatMessageA
GetConsoleTitleA
GetPrivateProfileStructW
GetTickCount
GetAtomNameA
WaitForSingleObject
lstrcpynA
GetTimeFormatA
HeapValidate
CloseHandle
GetConsoleAliasW
GetStringTypeA
GetModuleHandleA
GetCurrentProcess
GetProcessHeap
GetNumberFormatW
UpdateResourceA
GetComputerNameA
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 640B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ