Static task
static1
Behavioral task
behavioral1
Sample
3c8d3ff68f9bec2a5c34de5a535437da3d3ca81e88409b08ca63fc1ab813feb8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3c8d3ff68f9bec2a5c34de5a535437da3d3ca81e88409b08ca63fc1ab813feb8.exe
Resource
win10v2004-20220901-en
General
-
Target
3c8d3ff68f9bec2a5c34de5a535437da3d3ca81e88409b08ca63fc1ab813feb8
-
Size
118KB
-
MD5
4c0750aaf0f6fbd39420c6fe646b2970
-
SHA1
6d47811576ac46f5406da5ce16d5879deaafc674
-
SHA256
3c8d3ff68f9bec2a5c34de5a535437da3d3ca81e88409b08ca63fc1ab813feb8
-
SHA512
a53b186444d851da03a7d459935175f1d9abd083f7298451efa9cfbad36b7e9c99a86c5ee6a0bcf24569baa5c7735c38b374b98fb623430e86de24947fa7c76c
-
SSDEEP
1536:KQPKwSGyBfiJuRpihXKQqOvgiKmxtQUnd9InTotXT:BPKlrBfiJuRpilKUvgiKmxtHXT
Malware Config
Signatures
Files
-
3c8d3ff68f9bec2a5c34de5a535437da3d3ca81e88409b08ca63fc1ab813feb8.exe windows x86
c964ce773a478a2ed30abc5503fc8533
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTime
EnterCriticalSection
LocalFree
ReleaseMutex
FileTimeToSystemTime
FileTimeToLocalFileTime
CreateDirectoryW
MultiByteToWideChar
GetModuleHandleW
FreeLibrary
QueryPerformanceFrequency
TryEnterCriticalSection
GetModuleFileNameW
FindFirstFileW
CreateFileMappingW
CreateMutexW
GetExitCodeThread
OpenThread
GetACP
GetShortPathNameW
CreateFileA
IsDebuggerPresent
FindNextFileW
GetFileAttributesExW
CreateDirectoryA
UnmapViewOfFile
InitializeCriticalSection
DeleteCriticalSection
TlsFree
TlsAlloc
TlsGetValue
TlsSetValue
LeaveCriticalSection
SetLastError
LocalAlloc
CreateFileMappingA
OpenProcess
OutputDebugStringA
SetErrorMode
GetFileAttributesA
GetVersion
SuspendThread
ResumeThread
GetThreadContext
GetThreadPriority
VirtualQueryEx
TerminateThread
CreateThread
InterlockedCompareExchange
InterlockedIncrement
LCMapStringA
DeleteFileA
DeviceIoControl
lstrcmpiW
GetEnvironmentVariableA
GetSystemInfo
VirtualProtect
GetStringTypeW
GetStringTypeA
VirtualQuery
InterlockedExchange
RtlUnwind
HeapReAlloc
VirtualAlloc
Sleep
GetOEMCP
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
GetStartupInfoA
HeapAlloc
GetCommandLineA
UnhandledExceptionFilter
QueryPerformanceCounter
GetLocalTime
GetModuleHandleA
FindFirstFileA
ReadFile
SetFilePointer
WriteFile
FindNextFileA
FindClose
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
GlobalAlloc
CreateDirectoryExA
CopyFileA
GetPrivateProfileStringA
lstrcmpA
SetFileAttributesA
CloseHandle
GetLastError
IsDBCSLeadByte
WritePrivateProfileStringA
GetModuleFileNameA
lstrlenA
lstrcmpiA
ExpandEnvironmentStringsA
lstrcpynA
GetVersionExA
InterlockedDecrement
GetLocaleInfoA
RaiseException
SetEvent
SetEndOfFile
ResetEvent
GetThreadLocale
GetStringTypeExA
GetFullPathNameA
GetDiskFreeSpaceA
GetCPInfo
EnumCalendarInfoA
CreateEventA
CompareStringW
CompareStringA
GetSystemDirectoryA
lstrcpyA
ExitProcess
HeapSize
FreeEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
RemoveDirectoryW
user32
LoadStringA
CharPrevA
CharNextA
GetKeyboardType
wsprintfA
CharToOemA
ExitWindowsEx
advapi32
RegQueryInfoKeyA
RegDeleteValueA
LookupPrivilegeValueA
OpenProcessToken
RegDeleteKeyA
FreeSid
EqualSid
GetTokenInformation
AllocateAndInitializeSid
LookupAccountNameW
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
RegQueryValueExW
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegEnumValueA
RegOpenKeyA
RegCreateKeyA
RegCloseKey
RegCreateKeyExA
shell32
SHGetMalloc
SHGetPathFromIDListA
SHGetFolderPathW
ShellExecuteA
ole32
CoCreateInstance
CoUninitialize
oleaut32
SysReAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetLBound
SafeArrayCreate
VariantCopyInd
GetErrorInfo
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
msvcrt
qsort
fclose
strncmp
ctime
towlower
calloc
iswspace
ftell
wcstol
fseek
_getch
atol
iswprint
strchr
memmove
mbtowc
isleadbyte
ferror
malloc
free
atan2
iswxdigit
bsearch
memset
wcsstr
shlwapi
StrStrIA
StrCatBuffA
wnsprintfA
PathRemoveFileSpecA
rpcrt4
UuidCreate
Sections
.text Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ