Static task
static1
Behavioral task
behavioral1
Sample
a3a1dbab9efd8dc73454d6f60b20de6b4b2a5f9db803d59809582fe3b884f4b8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a3a1dbab9efd8dc73454d6f60b20de6b4b2a5f9db803d59809582fe3b884f4b8.exe
Resource
win10v2004-20220812-en
General
-
Target
a3a1dbab9efd8dc73454d6f60b20de6b4b2a5f9db803d59809582fe3b884f4b8
-
Size
311KB
-
MD5
f2c2449e54c1632e3bb206ec87ffdfe9
-
SHA1
b4165253af4585a405d3b0b759e86f7821b20d49
-
SHA256
a3a1dbab9efd8dc73454d6f60b20de6b4b2a5f9db803d59809582fe3b884f4b8
-
SHA512
36fbd76a91eb0b3361b23dfb3656d0d93f8429db563082adc8ac0cb5f8ea0baeb2a52d0a9cead4ee704d050a260609d10f903e08375460d662f970426d12eb03
-
SSDEEP
6144:KL/lKhOV0DDTS7cVbNs19AeAhjAzML0oGPm+CWziHNOjH5SDL:KLFC4cxtdGdoGPcJ2M
Malware Config
Signatures
Files
-
a3a1dbab9efd8dc73454d6f60b20de6b4b2a5f9db803d59809582fe3b884f4b8.exe windows x86
4f6fa4a8e3ac00d0c22a13e616127a97
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetSystemTimeAsFileTime
GetCurrentProcessId
GetStartupInfoA
ExitProcess
GetTickCount
CreateEventW
QueryPerformanceCounter
GlobalMemoryStatus
GetDiskFreeSpaceExW
GetLongPathNameA
Process32First
Process32Next
OpenProcess
OpenThread
SuspendThread
ResumeThread
lstrcpyA
CreateToolhelp32Snapshot
Thread32First
Thread32Next
DeleteFileW
GetModuleFileNameW
CreateDirectoryW
SetFileAttributesW
CreateDirectoryA
SetFileAttributesA
OutputDebugStringW
OutputDebugStringA
GetModuleFileNameA
SetCurrentDirectoryA
GetCommandLineA
GetModuleHandleW
GetTempPathW
GetPriorityClass
ResetEvent
SetEvent
LeaveCriticalSection
EnterCriticalSection
WaitForSingleObject
RaiseException
TerminateThread
CloseHandle
CreateThread
SetThreadPriority
Sleep
GetCurrentProcess
SetPriorityClass
SetErrorMode
GetCurrentThreadId
lstrlenA
lstrcmpiA
DeleteCriticalSection
InitializeCriticalSection
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
user32
FindWindowW
SendMessageA
PostMessageA
EnableWindow
PeekMessageA
GetDesktopWindow
RegisterClassA
GetWindowTextA
GetWindowThreadProcessId
IsIconic
GetMessageA
EnumThreadWindows
wvsprintfW
DispatchMessageA
TranslateMessage
LoadIconA
LoadCursorA
RegisterClassExA
FindWindowA
CreateWindowExA
ShowWindow
UpdateWindow
BeginPaint
EndPaint
PostQuitMessage
DestroyWindow
DefWindowProcA
UnregisterClassA
IsWindowVisible
wininet
HttpSendRequestA
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
HttpOpenRequestA
InternetConnectA
shlwapi
PathRemoveFileSpecW
PathAppendW
PathFileExistsW
PathFileExistsA
advapi32
RegDeleteValueA
RegOpenKeyExA
RegQueryInfoKeyW
RegEnumValueW
RegEnumValueA
RegQueryValueExW
RegSetValueExW
RegDeleteValueW
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegFlushKey
RegCloseKey
shell32
SHGetSpecialFolderPathA
ShellExecuteExW
ole32
CoInitialize
CoUninitialize
CoCreateInstance
odbc32
SQLFreeConnect
Sections
.text Size: 172KB - Virtual size: 171KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.init Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 67KB - Virtual size: 808KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ