Static task
static1
Behavioral task
behavioral1
Sample
4342e3ad8d37c71d798f8c3f3b21fbbc02b7c64247141851495a2d797c3b30b3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4342e3ad8d37c71d798f8c3f3b21fbbc02b7c64247141851495a2d797c3b30b3.exe
Resource
win10v2004-20220901-en
General
-
Target
4342e3ad8d37c71d798f8c3f3b21fbbc02b7c64247141851495a2d797c3b30b3
-
Size
307KB
-
MD5
b732537273cd2d1611ae30aad87e769f
-
SHA1
7de923647a87003fe6a5229de5f132c7c0c075e9
-
SHA256
4342e3ad8d37c71d798f8c3f3b21fbbc02b7c64247141851495a2d797c3b30b3
-
SHA512
7658b4bd84f967c5ae3d01d94aff2f55042cef775eb057b0e66846961167506bd8f4e5cb0b708a2b5f41b1f6d24d7b96ae8db763c813089c3bfbf9c0490f1dda
-
SSDEEP
6144:lIBZ3ZChf6+lv4+4Y4zZFVa9HhY+eJ/+/fe8ef7ulMbY1rt4eeQxsc:luZwhf6+l54h5ShY+eJ/+/fCu2bAOZQ
Malware Config
Signatures
Files
-
4342e3ad8d37c71d798f8c3f3b21fbbc02b7c64247141851495a2d797c3b30b3.exe windows x86
3d3ad7496f059c16588786d8202e0393
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameW
FindAtomW
CreateFileA
ExitThread
HeapCreate
GetDriveTypeA
GetFileAttributesA
ReleaseMutex
GetCommandLineW
GetDiskFreeSpaceW
lstrcpynA
GetModuleHandleW
GetTickCount
LoadLibraryW
ResetEvent
ReleaseMutex
CloseHandle
GetLocalTime
LocalFree
GetTickCount
user32
GetKeyState
CallWindowProcA
GetComboBoxInfo
EndDialog
GetDlgItem
CloseWindow
DispatchMessageA
GetMenu
DrawStateA
GetClassInfoA
DestroyCaret
FillRect
CreateWindowExA
snmpapi
SnmpTfxClose
SnmpUtilMemAlloc
SnmpTfxOpen
SnmpUtilMemFree
SnmpTfxQuery
modemui
CountryRunOnce
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 344KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 294KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ