Static task
static1
Behavioral task
behavioral1
Sample
3bd878a1b4065db9fc3d256d350c96308107d75d490e852e5abc990044d16cc5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3bd878a1b4065db9fc3d256d350c96308107d75d490e852e5abc990044d16cc5.exe
Resource
win10v2004-20221111-en
General
-
Target
3bd878a1b4065db9fc3d256d350c96308107d75d490e852e5abc990044d16cc5
-
Size
75KB
-
MD5
0d2ec30bf58c2ba0b8b63a5d0ca9eb69
-
SHA1
600a0a46d6649bc5b9ea5c102723f24977393af1
-
SHA256
3bd878a1b4065db9fc3d256d350c96308107d75d490e852e5abc990044d16cc5
-
SHA512
888d87479cc176dc975766ff359164c14854028e794e85dbe92b6cbedb02dc30f7073e0a04fea599c017a1c14711c9e30b6587537bc09ed81335b93350101f93
-
SSDEEP
1536:2HWsQlh85Kk4rcHqBTLCJOpu0mYUwkC+BNA7KuVhr/e:2HvMh84mHYFpu0mdVBNNunW
Malware Config
Signatures
Files
-
3bd878a1b4065db9fc3d256d350c96308107d75d490e852e5abc990044d16cc5.exe windows x86
23cc0876f1ce16a3160bfa99727327dd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlMoveMemory
SizeofResource
GetCurrentThread
GetProcAddress
DeleteFileA
GetModuleHandleA
GetThreadLocale
TerminateProcess
SetEnvironmentVariableA
RaiseException
GetExitCodeProcess
GetStringTypeExA
GetTempFileNameA
GetTimeZoneInformation
LoadResource
VirtualProtect
GetVersionExA
lstrcpyA
DuplicateHandle
GetTempPathA
GetShortPathNameA
LCMapStringA
MoveFileA
QueryPerformanceCounter
GetConsoleMode
msvcrt
__set_app_type
__p___initenv
_adjust_fdiv
_exit
__p__fmode
_XcptFilter
_controlfp
_except_handler3
__getmainargs
__p__commode
_initterm
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ