Static task
static1
Behavioral task
behavioral1
Sample
c3dd7f1a5a96a75a165210bc26b4fd23a6d43be81bbb3321b5ff958fc67bf0a1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c3dd7f1a5a96a75a165210bc26b4fd23a6d43be81bbb3321b5ff958fc67bf0a1.exe
Resource
win10v2004-20221111-en
General
-
Target
c3dd7f1a5a96a75a165210bc26b4fd23a6d43be81bbb3321b5ff958fc67bf0a1
-
Size
296KB
-
MD5
39bd104ab2fa18eb7e90ae0b8abfd7cb
-
SHA1
c88171781909a82442f990b46b5f5e2dd62c9899
-
SHA256
c3dd7f1a5a96a75a165210bc26b4fd23a6d43be81bbb3321b5ff958fc67bf0a1
-
SHA512
34028121da9f8d5d88103e3995c7e9b53e927de76b1911f3e2dca4897e7930646396a5e9da2eff9076dd55745e1efa675019824f5f906053614442ea4d6f8f5f
-
SSDEEP
6144:+5/BuzrDXP3PHBfP3HLp3PHrIXqvHlmU7wa2ubqKQDWyzY6O7AA3Sm:+5uzrD/3PHBfP3HLp3PHrcqFmba2+b
Malware Config
Signatures
Files
-
c3dd7f1a5a96a75a165210bc26b4fd23a6d43be81bbb3321b5ff958fc67bf0a1.exe windows x86
df019f0b46cfb372fa16aa13040b58e0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CloseHandle
lstrcatW
SetConsoleTitleW
GetLastError
lstrcpyW
GetPrivateProfileIntA
GetModuleHandleA
GetDiskFreeSpaceA
HeapCreate
InterlockedDecrement
SetEnvironmentVariableA
DeviceIoControl
CreateEventW
FindResourceA
LoadLibraryA
GetStringTypeW
Heap32Next
Heap32First
GetDiskFreeSpaceA
ReadFileEx
ReadConsoleA
adsldpc
ADsCreateDSObject
ADsEnumClasses
ADsCloseSearchHandle
ADsDeleteDSObject
uxtheme
CloseThemeData
GetThemeColor
GetThemeTextMetrics
GetThemeBool
DrawThemeEdge
DrawThemeBackground
SetWindowTheme
GetThemeSysSize
CloseThemeData
GetWindowTheme
OpenThemeData
GetThemeTextExtent
IsThemeActive
SetWindowTheme
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 292KB - Virtual size: 291KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ