Static task
static1
Behavioral task
behavioral1
Sample
3e1373b4313c5e628e9e8653006c4aaace56b4504da377f759c46157f4c82f7b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3e1373b4313c5e628e9e8653006c4aaace56b4504da377f759c46157f4c82f7b.exe
Resource
win10v2004-20220812-en
General
-
Target
3e1373b4313c5e628e9e8653006c4aaace56b4504da377f759c46157f4c82f7b
-
Size
99KB
-
MD5
3f5a504e26aa39ba9d21beaa33f886ea
-
SHA1
649f0d5324e9c53f261335598357a1e56177b3e7
-
SHA256
3e1373b4313c5e628e9e8653006c4aaace56b4504da377f759c46157f4c82f7b
-
SHA512
d758a2b9c8a3e0d9681f323115eceaf21e9756ee06b08b944e193947ecadd066c39f7e8a7b1639997f9f182b22e468118931138b811c5f5addfcfe265bb54fea
-
SSDEEP
1536:ZJBtEq2LYEktH06SlmUDHuY5RoJp0UG8GsgScYInDaSnxqEDI0lDjU5vH:JtEzP6AZu+RoLHgScYInuSnxqEk05c
Malware Config
Signatures
Files
-
3e1373b4313c5e628e9e8653006c4aaace56b4504da377f759c46157f4c82f7b.exe windows x86
9776b66c6377ebac1ee3b23c78bd0f54
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
ControlService
EnumServicesStatusW
LookupAccountNameW
ObjectDeleteAuditAlarmA
ObjectPrivilegeAuditAlarmW
RegisterEventSourceA
SetSecurityDescriptorGroup
kernel32
CloseHandle
CreateFileA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindVolumeClose
GetACP
GetCPInfo
GetCommandLineA
GetComputerNameExW
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessWorkingSetSize
GetStartupInfoA
GetStdHandle
GetStringTypeW
GetVersion
GetVersionExA
GlobalMemoryStatus
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
OpenEventW
RaiseException
RtlUnwind
SetCommConfig
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SetHandleInformation
SetLastError
SetProcessShutdownParameters
SleepEx
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WriteFile
lstrcpynA
user32
AnyPopup
ChangeClipboardChain
CloseClipboard
DlgDirListComboBoxW
DlgDirSelectComboBoxExW
EnumThreadWindows
FindWindowA
GetAsyncKeyState
GetIconInfo
GetMenuItemID
GetMessagePos
ImpersonateDdeClientWindow
IsCharUpperW
MessageBoxA
ModifyMenuW
OpenWindowStationA
SetWindowTextW
SetWindowsHookA
wsprintfA
urlmon
HlinkGoBack
HlinkNavigateString
IsValidURL
RegisterMediaTypes
Sections
.text Size: 35KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ