Static task
static1
Behavioral task
behavioral1
Sample
c3e8e637908b8e0f17d70183c31d1cc4fe0afd963c51f7fb560fbfa5cfb06254.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c3e8e637908b8e0f17d70183c31d1cc4fe0afd963c51f7fb560fbfa5cfb06254.exe
Resource
win10v2004-20220812-en
General
-
Target
c3e8e637908b8e0f17d70183c31d1cc4fe0afd963c51f7fb560fbfa5cfb06254
-
Size
117KB
-
MD5
8842d3dec8d1bddd8272e556c0ebf30e
-
SHA1
856f42f32e33a0648533cbbd46f433fad4ae270a
-
SHA256
c3e8e637908b8e0f17d70183c31d1cc4fe0afd963c51f7fb560fbfa5cfb06254
-
SHA512
c23bf92b0a16751bfd1c7da74b889423dc38323696a52724fa5b83e2c59a77ec298803ec743391b975caf652f7d0bb0a1001c2d45414d9ce8efb094714c1331d
-
SSDEEP
3072:ukUK6jr28t7WExTvwsVORMKP4sHL64Var80M+zKzpc:b6jrttTwVPrgr8+mzpc
Malware Config
Signatures
Files
-
c3e8e637908b8e0f17d70183c31d1cc4fe0afd963c51f7fb560fbfa5cfb06254.exe windows x86
83d1abe21242dbca5519539a1f0cac25
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFlags
LocalFree
EnumCalendarInfoA
lstrlenW
GetCurrentThreadId
FindAtomA
SetLastError
GetDriveTypeW
GetNumberFormatA
ResumeThread
HeapCreate
ReadFile
CreateEventW
GetPrivateProfileStringA
GetConsoleAliasA
TlsGetValue
FindClose
EnterCriticalSection
GetCurrentProcessId
GetModuleHandleA
user32
GetSysColor
GetCursorInfo
GetKeyboardType
GetMenuInfo
GetClientRect
DispatchMessageA
SetFocus
CallWindowProcW
GetClassInfoA
DispatchMessageA
DrawTextA
IsWindow
GetKeyState
stclient
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
DllCanUnloadNow
ntshrui
IsPathSharedA
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ