Static task
static1
Behavioral task
behavioral1
Sample
3a661f47b39332fb324dd8e31f093c8f845333729ec1e1a8e749ea45fc0d134a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3a661f47b39332fb324dd8e31f093c8f845333729ec1e1a8e749ea45fc0d134a.exe
Resource
win10v2004-20220901-en
General
-
Target
3a661f47b39332fb324dd8e31f093c8f845333729ec1e1a8e749ea45fc0d134a
-
Size
806KB
-
MD5
efd19c975a9dd690b07b76699f964b99
-
SHA1
43ad56e8f5085182f8785322a6233df3713fbc9e
-
SHA256
3a661f47b39332fb324dd8e31f093c8f845333729ec1e1a8e749ea45fc0d134a
-
SHA512
f7e7a95e3274fac3c8a359887fed32d8d6a7d4fd06e397ca01ed6722110ad97dfbef06f5a0324ebd07914c9f147a9f5f5a2f2a2b69fc1c5e56eb1c0145615c9c
-
SSDEEP
24576:jStR1e6pICcrc69ktKYjrzIFUID0vjG65ChqElMp:jSByf9XCr0Fbxvl
Malware Config
Signatures
Files
-
3a661f47b39332fb324dd8e31f093c8f845333729ec1e1a8e749ea45fc0d134a.exe windows x86
2f39aae8afa5166d9ab1a981f6e538cb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetStartupInfoW
lstrcpyW
CreateEventA
VirtualAllocEx
lstrcpyW
GetModuleHandleA
FileTimeToLocalFileTime
lstrcpyW
GetMailslotInfo
IsValidLocale
lstrcpyW
GetCommState
lstrcpyW
DeleteFileA
SetCurrentDirectoryA
GetModuleFileNameA
SetConsoleTitleA
GetStdHandle
GetVolumePathNameW
SetLastError
GetLocaleInfoA
lstrlenW
termmgr
DllUnregisterServer
DllGetClassObject
DllCanUnloadNow
DllRegisterServer
Sections
.text Size: 3KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 800KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Pdata Size: 512B - Virtual size: 284B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ