Static task
static1
Behavioral task
behavioral1
Sample
c3a3012e13b3174abe29451b78de3b9fde96c0bd493b4ed3bbfc63bf0609afe5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c3a3012e13b3174abe29451b78de3b9fde96c0bd493b4ed3bbfc63bf0609afe5.exe
Resource
win10v2004-20221111-en
General
-
Target
c3a3012e13b3174abe29451b78de3b9fde96c0bd493b4ed3bbfc63bf0609afe5
-
Size
71KB
-
MD5
3d73524b0980d35b0b6082832fde27e0
-
SHA1
3e931204e432e0188a6d9e5c5076028bcdf79fb9
-
SHA256
c3a3012e13b3174abe29451b78de3b9fde96c0bd493b4ed3bbfc63bf0609afe5
-
SHA512
66a242e2241cd8414e2000ee5c93ca0f31a02dda5326a27e1ce29944e5a4607b5b83c8587acb251da5ae9ff30aac444106a484ad79a6dbafc4aa52cdf7d73832
-
SSDEEP
1536:KKMonowh4ostPr2/kBmkWbpab+CtuMFxdWOo6CLvjs8wBjnv:Knonoros9Pkbpe+zOo6EwBjnv
Malware Config
Signatures
Files
-
c3a3012e13b3174abe29451b78de3b9fde96c0bd493b4ed3bbfc63bf0609afe5.exe windows x86
03f0c3ea45dfbcabd63abb83997f9656
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAllocEx
LockResource
WaitForMultipleObjects
GetModuleHandleA
GetThreadContext
FindResourceA
CloseHandle
SetThreadContext
WriteProcessMemory
ResumeThread
CreateThread
WaitForSingleObject
GetCurrentThread
GetCommandLineA
FindResourceExA
CreateProcessA
GetStartupInfoA
GetLastError
GetProcAddress
HeapAlloc
HeapFree
ExitProcess
GetProcessHeap
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 762B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 168B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 350B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ