Static task
static1
Behavioral task
behavioral1
Sample
3800e0a657465e98ac1000918155ead4d881f63aefa4f7a6db13377b721e1330.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3800e0a657465e98ac1000918155ead4d881f63aefa4f7a6db13377b721e1330.exe
Resource
win10v2004-20221111-en
General
-
Target
3800e0a657465e98ac1000918155ead4d881f63aefa4f7a6db13377b721e1330
-
Size
5.7MB
-
MD5
bb2359ede2b50bf358a834e9eeb28ade
-
SHA1
8bd10b42f73edd0034bc9135acae02b956db53fe
-
SHA256
3800e0a657465e98ac1000918155ead4d881f63aefa4f7a6db13377b721e1330
-
SHA512
f3ca918b2eb2130c78aa72168a2ff641447bd9962828c9ab90679655e6fe931edf7ebe4f1ebd03424cedae63c05959ac5392dd36cb63e1c4f8d2e9952bb23c27
-
SSDEEP
98304:ddiBo5HDuW4nP80ahTNPP1/nqP9LX9fGlEKvDxqaeftEJuj049ehgyuaau1k6Cz:7+o5HDu5POxN9Y9LX9+lEAtDe1UkQhxS
Malware Config
Signatures
Files
-
3800e0a657465e98ac1000918155ead4d881f63aefa4f7a6db13377b721e1330.exe windows x86
bc87facc51e453a0cc940988a0425e5e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThread
InitializeCriticalSection
CreateFileW
LoadLibraryA
GetCurrentProcess
CloseHandle
CreateMutexA
FileTimeToSystemTime
DuplicateHandle
IsBadReadPtr
GetTickCount
GetProcAddress
InterlockedCompareExchange
SetLastError
GetModuleHandleA
GetVersionExA
GetModuleHandleExW
VirtualProtect
HeapFree
HeapAlloc
GetProcessHeap
SystemTimeToFileTime
Sleep
GetLocalTime
ExitThread
HeapReAlloc
VirtualFree
GetLastError
VirtualAlloc
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LCMapStringW
LoadLibraryW
OutputDebugStringW
LoadLibraryExW
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
FlushFileBuffers
TlsAlloc
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
RtlUnwind
GetCommandLineA
InterlockedDecrement
ExitProcess
MultiByteToWideChar
GetStdHandle
WriteFile
GetModuleFileNameW
HeapSize
RaiseException
IsDebuggerPresent
InterlockedIncrement
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
GetCurrentThreadId
WideCharToMultiByte
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
advapi32
RegQueryValueExA
RegOpenKeyExW
RegQueryInfoKeyW
RegQueryValueA
RegQueryInfoKeyA
RegCreateKeyExA
RegOpenKeyW
RegEnumKeyW
user32
RegisterClassExW
MessageBoxA
GetDesktopWindow
PostMessageA
FindWindowA
GetWindowTextW
BringWindowToTop
DestroyWindow
RegisterClassExA
UpdateWindow
RegisterWindowMessageW
SendMessageW
LoadIconA
FindWindowW
PostQuitMessage
TrackPopupMenu
TranslateMessage
MessageBoxW
SetWindowPos
LoadIconW
ShowWindow
SendMessageA
SetForegroundWindow
DefWindowProcW
GetWindowTextA
RegisterWindowMessageA
CheckMenuItem
Sections
.text Size: 446KB - Virtual size: 445KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 355KB - Virtual size: 354KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4.9MB - Virtual size: 4.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ