Static task
static1
Behavioral task
behavioral1
Sample
3fba97a8d428d76d8af62fdab61563d87693bb3ea98cca1edcf5e0bb8c6da4aa.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3fba97a8d428d76d8af62fdab61563d87693bb3ea98cca1edcf5e0bb8c6da4aa.exe
Resource
win10v2004-20220812-en
General
-
Target
3fba97a8d428d76d8af62fdab61563d87693bb3ea98cca1edcf5e0bb8c6da4aa
-
Size
178KB
-
MD5
0455a353ac8ff3107c2c4fdcd4b49700
-
SHA1
96bacf8398c94d7624dba0977e3e13d035ed043e
-
SHA256
3fba97a8d428d76d8af62fdab61563d87693bb3ea98cca1edcf5e0bb8c6da4aa
-
SHA512
4cd809334b797c68020530937a90dfb8ea6990cfb10b84da97d39cb3ffa8b4f67db7e4c9d61e77c8c946921dec59501a3a078a86c0d1084746cf7073c1de6648
-
SSDEEP
3072:w81k7ZQ7B+ceNpqvpfUJkbHzJ4lzJ22kHXM0E88IpHJRe6HCz3nY5l:w81ki7BYiKJwHzJ4lzJD2M5fIpHJRvug
Malware Config
Signatures
Files
-
3fba97a8d428d76d8af62fdab61563d87693bb3ea98cca1edcf5e0bb8c6da4aa.exe windows x86
229a9cb6179e68e8dad2c1f833091244
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
VirtualAlloc
CreateEventA
ResetEvent
lstrcpyA
SetEvent
InterlockedExchange
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetVersionExA
CreateDirectoryA
GetDriveTypeA
RemoveDirectoryA
WriteFile
ReadFile
SetFilePointer
GetLastError
SetLastError
CreateProcessA
GetCurrentProcess
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
MoveFileA
GetLocalTime
HeapFree
HeapAlloc
GetProcessHeap
GlobalFree
GlobalUnlock
OutputDebugStringA
GetDiskFreeSpaceExA
GlobalMemoryStatusEx
CloseHandle
CreateFileA
ReleaseMutex
SetErrorMode
RaiseException
LocalAlloc
FreeLibrary
GetStartupInfoA
GetModuleHandleA
msvcrt
memcmp
strcpy
strchr
malloc
strcmp
free
_except_handler3
strrchr
rename
strcat
strncmp
atoi
_errno
strtok
strncat
_beginthreadex
??2@YAPAXI@Z
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
memset
strstr
strlen
calloc
_ftol
memmove
memcpy
_CxxThrowException
__CxxFrameHandler
??3@YAXPAX@Z
ceil
_strnicmp
_strupr
msvcp60
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
Sections
.text Size: 129KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hkyn Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE