Static task
static1
Behavioral task
behavioral1
Sample
7d3b3e4be72fc8d66c7c27cd7a6ab6fbfc680e6aa7d6a1fa5d032521522759c2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7d3b3e4be72fc8d66c7c27cd7a6ab6fbfc680e6aa7d6a1fa5d032521522759c2.exe
Resource
win10v2004-20220812-en
General
-
Target
7d3b3e4be72fc8d66c7c27cd7a6ab6fbfc680e6aa7d6a1fa5d032521522759c2
-
Size
6KB
-
MD5
67dc0389e2b6f43e91a587a62c097988
-
SHA1
7dc27a28eb39c0db3d6d888e7b9aa0973697bf8a
-
SHA256
7d3b3e4be72fc8d66c7c27cd7a6ab6fbfc680e6aa7d6a1fa5d032521522759c2
-
SHA512
c014c11c6aea6d3afeed3ed4b268665f35f692418d8469933fd8caae2e1726460ec33f723de42a84f603e4a866872bd0f72536c1a720f3a1cc9ab86a07a2e21a
-
SSDEEP
96:873eag2F8Pdrcp1JQTx15WOGBulGkErUoynM/dzccKIpFqt:87eTdriQgBulGlrUoynM/dW3
Malware Config
Signatures
Files
-
7d3b3e4be72fc8d66c7c27cd7a6ab6fbfc680e6aa7d6a1fa5d032521522759c2.exe windows x86
a3a56c48371a2a0839519e7a7cff401c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSetValueExW
RegOpenKeyExW
RegSetValueExA
RegOpenKeyExA
RegCloseKey
user32
wsprintfW
msvcrt
ftell
fseek
_wfopen
strstr
getenv
_snprintf
memset
swprintf
sprintf
rewind
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
fread
fclose
printf
memcpy
strncat
strcat
fwrite
_wgetenv
_snwprintf
wcsstr
_wremove
exit
strlen
??2@YAPAXI@Z
strcpy
wcslen
_exit
kernel32
GetStartupInfoA
GetModuleHandleA
SetErrorMode
FindFirstFileW
FindNextFileW
GetProcessHeap
HeapAlloc
HeapFree
GetWindowsDirectoryW
GetModuleFileNameW
SetFileAttributesW
CopyFileW
CreateProcessW
CreateThread
Sleep
CreateMutexW
GetLastError
ExitProcess
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE