Static task
static1
Behavioral task
behavioral1
Sample
3816dd48d2b602e49cad01ad3ddeb7562c2f2a6f5cce4bf70c3c992bfaa9afba.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3816dd48d2b602e49cad01ad3ddeb7562c2f2a6f5cce4bf70c3c992bfaa9afba.exe
Resource
win10v2004-20220901-en
General
-
Target
3816dd48d2b602e49cad01ad3ddeb7562c2f2a6f5cce4bf70c3c992bfaa9afba
-
Size
439KB
-
MD5
759cdf5778036b679842f84af5189fa9
-
SHA1
0a771824abf50f3c20621482ed702692c98747f6
-
SHA256
3816dd48d2b602e49cad01ad3ddeb7562c2f2a6f5cce4bf70c3c992bfaa9afba
-
SHA512
3d3bb9df4eb321b6cb54c93d9c819fe640aa1d1b309c12b64304e352d86fd994b65f1d6f5a658bf3cbf800de24b8a0eb008bb73a544d0bf3bb9f4c516999193d
-
SSDEEP
6144:BNdCohONmAL4cIZiZF/p/uwONct43D92UzUbkrdO5RwHIUKmxApX58N:B3CkA7IoZ9pGHNu4B2UzzROQooypp8N
Malware Config
Signatures
Files
-
3816dd48d2b602e49cad01ad3ddeb7562c2f2a6f5cce4bf70c3c992bfaa9afba.exe windows x86
55fb4d0a517fb2cce4c996d8581c4b64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc90
ord5636
ord3732
ord5139
ord4688
ord1729
ord6446
ord5668
ord5666
ord958
ord963
ord967
ord965
ord969
ord2610
ord2630
ord2614
ord2620
ord2618
ord2616
ord2633
ord2628
ord2612
ord2635
ord2623
ord2605
ord2607
ord2625
ord2375
ord2368
ord1644
ord6784
ord4160
ord6782
ord3671
ord5389
ord6356
ord3218
ord1446
ord5608
ord2139
ord1792
ord1791
ord1728
ord5633
ord3135
ord4895
ord4668
ord3506
ord2069
ord4589
ord744
ord524
ord4993
ord3987
ord6780
ord5497
ord2074
ord5585
ord4650
ord1496
ord4331
ord1752
ord1755
ord6388
ord3344
ord1678
ord1809
ord1137
ord1108
ord374
ord266
ord1810
ord5309
ord5152
ord4617
ord265
ord4434
ord4409
ord6783
ord4159
ord6781
ord4733
ord2251
ord2206
ord6018
ord4165
ord1046
ord5533
ord6721
ord5813
ord4199
ord2087
ord3209
ord5657
ord5659
ord2447
ord4333
ord4981
ord5663
ord5646
ord6001
ord2766
ord2978
ord3107
ord4714
ord2961
ord3110
ord2769
ord2888
ord2759
ord4066
ord4067
ord4057
ord2886
ord4334
ord5615
ord5167
ord4890
ord4667
ord3659
ord639
ord2208
ord6462
ord4197
ord793
ord589
ord4029
ord4952
ord310
ord1276
ord601
ord800
msvcr90
memcpy
_setmbcp
_CIsqrt
_unlock
memset
_controlfp_s
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
_crt_debugger_hook
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
__CxxFrameHandler3
exit
_stricmp
wcstombs_s
fclose
fwrite
fopen
vsprintf
malloc
sprintf
free
kernel32
GetModuleHandleA
Sleep
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
OpenProcess
WinExec
DeleteFileA
CreateThread
IsBadReadPtr
VirtualAllocEx
VirtualAlloc
WriteProcessMemory
VirtualFree
VirtualFreeEx
CreateRemoteThread
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetProcAddress
GetVersionExA
GetCurrentProcess
user32
EnableWindow
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
SetTimer
SendMessageA
LoadIconA
SetWindowLongA
GetForegroundWindow
ScreenToClient
GetCursorPos
CallWindowProcA
shell32
ShellExecuteA
msvcp90
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIABV12@I@Z
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
psapi
GetModuleFileNameExA
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 71KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 252KB - Virtual size: 256KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE