Static task
static1
Behavioral task
behavioral1
Sample
3d81ae45554821db518c3d976f66ae778d7c0314706883ab2189368a1349e6fd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3d81ae45554821db518c3d976f66ae778d7c0314706883ab2189368a1349e6fd.exe
Resource
win10v2004-20220812-en
General
-
Target
3d81ae45554821db518c3d976f66ae778d7c0314706883ab2189368a1349e6fd
-
Size
855KB
-
MD5
e0c08bb67964327b3f3651b7e1e4587c
-
SHA1
291402aaed90e08d03e74fbe32c1926afb52e32f
-
SHA256
3d81ae45554821db518c3d976f66ae778d7c0314706883ab2189368a1349e6fd
-
SHA512
4dd21204adae5940e34032391826bedd5f68307cbdd71517f0efca44c436b92506c45a4715a41a5918138c733daf8a6c46ec80b16490882f9a6f21aa22db6639
-
SSDEEP
24576:B4/a9NNBcuO/FWPkLc9sfRAHpEFEwaJ9tlBFnB:xNNO9Zca+Hpp/jhB
Malware Config
Signatures
Files
-
3d81ae45554821db518c3d976f66ae778d7c0314706883ab2189368a1349e6fd.exe windows x86
73bf52ef9532deddbd7df85cf3810c0a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryA
SetCurrentDirectoryA
CreateFileA
CloseHandle
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
WaitForSingleObject
DeleteCriticalSection
FreeLibrary
VirtualProtect
RemoveDirectoryA
GetProcAddress
VirtualAlloc
GetCommandLineW
GetTickCount
CreateEventA
Sleep
SetEvent
GetCurrentProcessId
GetCurrentProcess
GetFullPathNameW
GetTempPathW
DeleteFileW
CopyFileW
GetTempPathA
GetModuleFileNameW
VirtualFree
SizeofResource
LoadResource
FindResourceW
LoadLibraryA
GetModuleHandleA
GetLastError
HeapFree
ReadFile
GetCommandLineA
EncodePointer
DecodePointer
CreateThread
ExitThread
LoadLibraryExW
GetSystemTimeAsFileTime
HeapAlloc
GetProcessHeap
IsDebuggerPresent
IsProcessorFeaturePresent
SetFilePointer
MultiByteToWideChar
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetStdHandle
GetFileType
InitializeCriticalSectionAndSpinCount
GetStartupInfoW
RtlUnwind
SetLastError
InterlockedIncrement
InterlockedDecrement
ExitProcess
GetModuleHandleExW
AreFileApisANSI
GetModuleFileNameA
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetFileAttributesExW
SetStdHandle
FlushFileBuffers
GetConsoleCP
CreateFileW
HeapReAlloc
OutputDebugStringW
LoadLibraryW
GetStringTypeW
LCMapStringW
WriteConsoleW
SetEndOfFile
HeapSize
advapi32
CryptGenRandom
CryptAcquireContextA
CryptContextAddRef
comctl32
CreateToolbarEx
ImageList_SetOverlayImage
DestroyPropertySheetPage
Sections
.text Size: 133KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 683KB - Virtual size: 696KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ