Static task
static1
Behavioral task
behavioral1
Sample
b3cb39b2aa7b54627d986c2bd64100d49a3d8995232880a03da212a4d74dec92.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b3cb39b2aa7b54627d986c2bd64100d49a3d8995232880a03da212a4d74dec92.exe
Resource
win10v2004-20220812-en
General
-
Target
b3cb39b2aa7b54627d986c2bd64100d49a3d8995232880a03da212a4d74dec92
-
Size
213KB
-
MD5
702652db587968790a356071e57dff7a
-
SHA1
6272e13f526f305f614e770d61542bcb26145473
-
SHA256
b3cb39b2aa7b54627d986c2bd64100d49a3d8995232880a03da212a4d74dec92
-
SHA512
feedcf2e41a8578c7fc61aaaab747f67f2b17776500cb13381c5bd8c1bd1fc0afa950cc7dc8e9c64cb01edfa827f2c62f1a8319d51a1d0d462367825734618cb
-
SSDEEP
6144:TGbTt//UUoj6SFPPz9HyD80DsIIzp9JFAQ:yR//UUohRHyZDuzp9JF
Malware Config
Signatures
Files
-
b3cb39b2aa7b54627d986c2bd64100d49a3d8995232880a03da212a4d74dec92.exe windows x86
315d51d788a44090f0593c26f47f0390
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetProcessWindowStation
IsCharUpperW
SetWindowRgn
ValidateRect
SetClassLongA
SetWindowTextA
EnumDesktopsA
IsCharAlphaNumericA
GetActiveWindow
ole32
CoRevokeClassObject
IIDFromString
kernel32
GetSystemTimeAsFileTime
FindResourceExW
SizeofResource
LoadResource
GlobalFlags
HeapDestroy
LocalAlloc
LocalFree
SetFileAttributesA
GetStartupInfoA
HeapFree
HeapCreate
HeapAlloc
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
FreeLibrary
GetProcAddress
LoadLibraryA
GetThreadContext
Sections
.text Size: 195KB - Virtual size: 195KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ