Static task
static1
Behavioral task
behavioral1
Sample
b3dd768de38c096e572c46cd8490753841a566c2f7d56c319a0c38af18811e50.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b3dd768de38c096e572c46cd8490753841a566c2f7d56c319a0c38af18811e50.exe
Resource
win10v2004-20220901-en
General
-
Target
b3dd768de38c096e572c46cd8490753841a566c2f7d56c319a0c38af18811e50
-
Size
172KB
-
MD5
9cb39a0760a696c39d37c737756ab64a
-
SHA1
5af148e8405fb1006e9a96b8739a645a35faf19b
-
SHA256
b3dd768de38c096e572c46cd8490753841a566c2f7d56c319a0c38af18811e50
-
SHA512
620798acf38585f92667eb921da5c4d784cad2e83fa1e295113f0f0259d11e0e5bfe42aadaad29970abd260a6b23e470d6a67179a9f9c192d05c8e55d989492f
-
SSDEEP
1536:5OBsMCxuE/iv9hCY66MNclpXhtNQLEMQz3DsECjED83hR:MU6zb66qIpdQLm3DBCgQ3
Malware Config
Signatures
Files
-
b3dd768de38c096e572c46cd8490753841a566c2f7d56c319a0c38af18811e50.exe windows x86
c622a9f0ddd0f756e80807cbefefdbd4
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegCloseKey
RegQueryValueExA
RegOpenKeyW
RegEnumValueW
RegCreateKeyExA
OpenProcessToken
RegOpenKeyExW
OpenThreadToken
RegEnumKeyExW
RegDeleteValueW
RegEnumValueW
RegSetValueExW
FreeSid
RegDeleteValueW
RegQueryInfoKeyW
RegOpenKeyW
RegDeleteKeyW
RegDeleteKeyW
RegOpenKeyExW
CloseServiceHandle
RegDeleteKeyW
AddAccessAllowedAce
RegCreateKeyExA
RegOpenKeyExW
RegQueryInfoKeyW
CloseServiceHandle
RegQueryInfoKeyW
RegOpenKeyW
FreeSid
user32
GetWindow
CheckDlgButton
DispatchMessageA
SetForegroundWindow
CreateDialogParamW
PostMessageW
ShowWindow
GetKeyState
PtInRect
ReleaseDC
DrawTextW
PostMessageW
RegisterClassW
CreateWindowExW
WinHelpW
kernel32
CreateThread
GetTickCount
ReadFile
GetStartupInfoW
WaitForSingleObject
ReadFile
lstrcpyW
LoadLibraryA
GetACP
GetSystemTimeAsFileTime
Sections
Size: 148KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�vmp0 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
�reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 512B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE