Static task
static1
Behavioral task
behavioral1
Sample
a3988830de32ce6dc009eb511e1f17e27ef9468957dbed44f02ba3c9c99ee848.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a3988830de32ce6dc009eb511e1f17e27ef9468957dbed44f02ba3c9c99ee848.exe
Resource
win10v2004-20220812-en
General
-
Target
a3988830de32ce6dc009eb511e1f17e27ef9468957dbed44f02ba3c9c99ee848
-
Size
821KB
-
MD5
4bb18b9dc7414b81f4232a9a56be9034
-
SHA1
3792a1d2600ca1f35c213ba509d894ee1f577bea
-
SHA256
a3988830de32ce6dc009eb511e1f17e27ef9468957dbed44f02ba3c9c99ee848
-
SHA512
4b5f6006b46477951ec65169e6df18b3540d79bd9eb3d2b49d5e7e9d55d95d91205d7516caa5757a2f5363deb84b872fd7e6b118dedcde757e27bdbf91d859f7
-
SSDEEP
24576:G+RMzQZj8592f+8EBXuX4fp1GBvRyJb7b5O:G+RMajMQKuX6eRyRX
Malware Config
Signatures
Files
-
a3988830de32ce6dc009eb511e1f17e27ef9468957dbed44f02ba3c9c99ee848.exe windows x86
c17d9fcccf46e198218220f088846591
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
ResetEvent
VirtualAllocEx
LocalFree
lstrlenA
GetDriveTypeA
WriteFile
GlobalFree
CreateEventW
GetLocalTime
GlobalFlags
SetEvent
LoadLibraryW
InitializeCriticalSection
ReleaseMutex
GetCurrentThreadId
CloseHandle
IsBadStringPtrA
GetPrivateProfileIntW
GetEnvironmentVariableW
user32
CallWindowProcW
IsWindow
GetSysColor
GetSysColor
GetClassInfoA
EndDialog
CreateWindowExA
GetKeyboardType
DrawStateW
DispatchMessageA
GetClientRect
SetFocus
GetCursorInfo
mmcshext
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
advapi32
InitializeSid
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 809KB - Virtual size: 809KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ