Static task
static1
Behavioral task
behavioral1
Sample
a3f596ad241142a654bcad82198f3bde9ce2454259ef02955c6dd5ea4b58a012.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a3f596ad241142a654bcad82198f3bde9ce2454259ef02955c6dd5ea4b58a012.exe
Resource
win10v2004-20221111-en
General
-
Target
a3f596ad241142a654bcad82198f3bde9ce2454259ef02955c6dd5ea4b58a012
-
Size
116KB
-
MD5
f396b9f64543f0db8a41058d193c3c37
-
SHA1
2e51dbf4c177ccdf98d71bb1f28e94685df5d2bf
-
SHA256
a3f596ad241142a654bcad82198f3bde9ce2454259ef02955c6dd5ea4b58a012
-
SHA512
49369ca3e819dcc04b1ba089eeb0a5d17405624a16e5abd61d953cf2d63576c16ee696267ae4d0e8e601de05aeda9e532cd03ea8424ca64e336f88328a2022a7
-
SSDEEP
3072:kJtsYJXhxM88ixTl61MnMrMnMx8RlcXfZ7gC/C6:kJtPlWyg1MnMrMnM0uqC/C6
Malware Config
Signatures
Files
-
a3f596ad241142a654bcad82198f3bde9ce2454259ef02955c6dd5ea4b58a012.exe windows x86
e52399d69cb6a1c12b1e8a777d9cc4cc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
MultiByteToWideChar
WideCharToMultiByte
RaiseException
GetLastError
InitializeCriticalSection
DeleteCriticalSection
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
GetSystemInfo
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GetCurrentProcess
HeapFree
GetProcessHeap
GetThreadLocale
GetCurrentThreadId
GetUserDefaultLangID
OpenProcess
GetCurrentProcessId
CloseHandle
WaitForSingleObject
SetStdHandle
SetFilePointer
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FlushFileBuffers
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
WriteFile
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualFree
HeapCreate
GetLocaleInfoA
GetACP
InterlockedExchange
LoadLibraryA
GetProcAddress
FreeLibrary
GetSystemDirectoryA
GetModuleFileNameA
HeapAlloc
lstrlenA
LCMapStringW
LCMapStringA
GetCPInfo
GetOEMCP
HeapDestroy
HeapReAlloc
HeapSize
VirtualProtect
VirtualAlloc
VirtualQuery
RtlUnwind
ExitProcess
GetModuleHandleA
TerminateProcess
GetStartupInfoA
GetCommandLineA
user32
GetWindow
GetDlgItem
EnableWindow
SendMessageA
GetDlgCtrlID
SetDlgItemTextA
SetWindowTextA
PostMessageA
EndDialog
SetForegroundWindow
LoadCursorA
SetCursor
ExitWindowsEx
DialogBoxParamA
SetWindowLongA
GetActiveWindow
MessageBoxA
UnregisterClassA
FindWindowA
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
OpenProcessToken
shell32
ShellExecuteA
Sections
.text Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ