Static task
static1
Behavioral task
behavioral1
Sample
b3c2f784f6266deefeae7e701f5aeedc4b086596a6405eeb5a77b2a15581242c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b3c2f784f6266deefeae7e701f5aeedc4b086596a6405eeb5a77b2a15581242c.exe
Resource
win10v2004-20220812-en
General
-
Target
b3c2f784f6266deefeae7e701f5aeedc4b086596a6405eeb5a77b2a15581242c
-
Size
63KB
-
MD5
76b33d47f572fd37bb4fdcc6138b97f2
-
SHA1
94b0fd7a0b3bb74c041f6d068c9d1804b4df88cd
-
SHA256
b3c2f784f6266deefeae7e701f5aeedc4b086596a6405eeb5a77b2a15581242c
-
SHA512
5ac0e55bacaf56fa74351bdf0f18afb2b4d83eefa4890910d9452207fa7f795147fcd6b080e8d5aba3ced51e2e9815899e23358f59c57a0d5265ab91c88ad770
-
SSDEEP
1536:WdDli9bGCKO8lCqarm2euXqdddddddddddddddddddddddddddddddddddddddd2:WZg9bGC98lTvQXNRxm4Vh
Malware Config
Signatures
Files
-
b3c2f784f6266deefeae7e701f5aeedc4b086596a6405eeb5a77b2a15581242c.exe windows x86
23d13cf951a56e7e7f97a31e889f42b3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
FindClose
GetACP
CloseHandle
LocalFree
GetEnvironmentVariableA
ReleaseMutex
LoadLibraryW
FindResourceA
TlsGetValue
lstrlen
CreateMutexA
IsBadStringPtrW
Sleep
SetLastError
CreateFileA
PulseEvent
HeapCreate
TerminateThread
GlobalUnlock
user32
DispatchMessageA
IsWindow
GetDlgItem
CallWindowProcA
DefWindowProcW
CopyRect
CheckRadioButton
DrawMenuBar
FillRect
DrawEdge
SetFocus
GetDC
GetIconInfo
msasn1
ASN1BERDecBool
ASN1BEREncBool
ASN1BEREncEoid
ASN1BERDecNull
ASN1BERDecCheck
dpnet
DirectPlay8Create
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE