Static task
static1
Behavioral task
behavioral1
Sample
3d60f04777b8d605b361193b3f63f577b45d15ffbe8ad16b2779469f58ed3b39.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3d60f04777b8d605b361193b3f63f577b45d15ffbe8ad16b2779469f58ed3b39.exe
Resource
win10v2004-20221111-en
General
-
Target
3d60f04777b8d605b361193b3f63f577b45d15ffbe8ad16b2779469f58ed3b39
-
Size
401KB
-
MD5
11af70f5fc7c90ccc81009425c815ae0
-
SHA1
a61fbf1c8da3fbc75e7bfefbee2dced9a58a45a1
-
SHA256
3d60f04777b8d605b361193b3f63f577b45d15ffbe8ad16b2779469f58ed3b39
-
SHA512
cd2ffdd366d36dc18d9f37fc4cf190122bfbd652fc1181930611b627751275dd63b50b4da00b939498e26430c7d28a80d0e8f83094b16e02e39668432f4c47d1
-
SSDEEP
12288:uImhBpg7/Uf1gNQG8L8LRJTrKkIrhve9:JcpM/I1mEYr3t
Malware Config
Signatures
Files
-
3d60f04777b8d605b361193b3f63f577b45d15ffbe8ad16b2779469f58ed3b39.exe windows x86
fd5e15103ae42eb0bde22fe4c7aaf020
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Heap32First
GetModuleHandleW
CreateFileMappingW
SetFilePointer
SetCurrentDirectoryA
GetStringTypeW
GetStringTypeW
DeleteFileA
DeleteFileA
VirtualAlloc
SetEnvironmentVariableA
Heap32Next
DeleteFileA
SetVolumeLabelW
GetACP
SetEndOfFile
GetShortPathNameW
WriteConsoleW
CreateMailslotA
LoadLibraryA
GetProcessHeap
GetConsoleAliasA
GetConsoleTitleA
msoeacct
GetDllMajorVersion
DllGetClassObject
ValidEmailAddress
DllCanUnloadNow
Sections
.text Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.orpc Size: 393KB - Virtual size: 884KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avr Size: 1024B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE