Static task
static1
Behavioral task
behavioral1
Sample
c3a4b05cc2f50723ab761f9467647717439155301bce17ba54c65f7061896e46.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c3a4b05cc2f50723ab761f9467647717439155301bce17ba54c65f7061896e46.exe
Resource
win10v2004-20220901-en
General
-
Target
c3a4b05cc2f50723ab761f9467647717439155301bce17ba54c65f7061896e46
-
Size
354KB
-
MD5
6e544be6dc98f4357d59b75e48018563
-
SHA1
4dddf6939e047dd111663ba4d82991e59961bde3
-
SHA256
c3a4b05cc2f50723ab761f9467647717439155301bce17ba54c65f7061896e46
-
SHA512
88dc0ba90bd1b051e2ca822a53ad52a2cff7fc7edf1aa5680553d26eec0eb19e12a7bb5bdc89f3dab98a60e1ad54b552155a552fa50e32c099779a38c7722528
-
SSDEEP
6144:kluqRtS+VT+zyRQkDjZwUaFqzwHKMTZjU5cSwckOJfg1dSdQA:mu3+Vb6IZw7ozwHbZjU5c5ciS
Malware Config
Signatures
Files
-
c3a4b05cc2f50723ab761f9467647717439155301bce17ba54c65f7061896e46.exe windows x86
c9ff9c6179944957369bf74fc976cd62
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
SysAllocString
VariantInit
VariantCopy
VariantChangeType
SysAllocStringByteLen
SysFreeString
VarUI4FromStr
LoadTypeLi
RegisterTypeLi
LoadRegTypeLi
SysStringLen
CreateErrorInfo
VariantClear
SysStringByteLen
ole32
CoTaskMemFree
CoRegisterClassObject
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
CoUninitialize
CoInitialize
OleRun
CLSIDFromProgID
CLSIDFromString
CoRevokeClassObject
kernel32
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
lstrcpynW
HeapDestroy
lstrcatW
GetModuleFileNameW
SetEvent
CloseHandle
WaitForSingleObject
FreeLibrary
GetProcAddress
LoadLibraryW
lstrcpyW
CreateEventW
lstrlenA
SizeofResource
LoadResource
FindResourceW
GetLastError
LoadLibraryExW
GetShortPathNameW
Sleep
GetCurrentThreadId
GetCommandLineW
LeaveCriticalSection
EnterCriticalSection
LocalFree
ExitProcess
HeapFree
HeapAlloc
GetProcessHeap
FindClose
FindNextFileW
DeleteFileW
FindFirstFileW
GetSystemTimeAsFileTime
CreateDirectoryW
ResetEvent
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetModuleHandleA
TerminateProcess
GetCurrentProcess
UnlockFile
WriteFile
LockFile
SetFilePointer
CreateFileW
GetStartupInfoW
lstrlenW
MultiByteToWideChar
CreateThread
GetLocalTime
user32
PostThreadMessageW
DispatchMessageW
GetMessageW
CharNextW
wvsprintfW
advapi32
RegDeleteKeyW
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
LogonUserW
ImpersonateLoggedOnUser
CryptAcquireContextW
CryptGetUserKey
CryptDecrypt
CryptDestroyKey
CryptReleaseContext
GetUserNameW
RevertToSelf
RegQueryValueExW
RegEnumKeyExW
RegEnumValueW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
msvcrt
_cexit
malloc
free
??3@YAXPAX@Z
realloc
??2@YAPAXI@Z
__CxxFrameHandler
_purecall
wcscat
wcscpy
wcsncmp
_wcsupr
swprintf
wcsncat
_except_handler3
wcsncpy
_wgetenv
_CxxThrowException
_snwprintf
_c_exit
_exit
_XcptFilter
wcslen
exit
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__dllonexit
_onexit
_controlfp
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 312KB - Virtual size: 311KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE