?TLS@@YGXK@Z
Static task
static1
Behavioral task
behavioral1
Sample
03818cbf3a278f0830aeea45567456679507911c362072d833e5f54c40452d1e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
03818cbf3a278f0830aeea45567456679507911c362072d833e5f54c40452d1e.exe
Resource
win10v2004-20220812-en
General
-
Target
03818cbf3a278f0830aeea45567456679507911c362072d833e5f54c40452d1e
-
Size
146KB
-
MD5
49b90127b6e49629e7234f4715748d90
-
SHA1
31649540c914e5c3f4150875bf768f357535a432
-
SHA256
03818cbf3a278f0830aeea45567456679507911c362072d833e5f54c40452d1e
-
SHA512
a464271935075726514dbbba9e77873902e20da67e29106000912a7e51621da3e27eb90f27305646900068452605e999c328bd6d58c881fccf044a7a460f5a55
-
SSDEEP
3072:vRRdf/TVRwoLFMieB3Z2JkmE0J/sFl5MYvWf0JOBLwkNC:vRRd3IIFM1B3QJkV0BsFlW9sJOBMkNC
Malware Config
Signatures
Files
-
03818cbf3a278f0830aeea45567456679507911c362072d833e5f54c40452d1e.exe windows x86
3615101c980db621abaa8a1abe6d2046
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathIsPrefixW
user32
GetParent
kernel32
ReadFile
RemoveDirectoryA
OpenFile
CreateMutexW
GetShortPathNameW
lstrcatA
SetCommState
AddAtomA
DeleteFileW
GetNumberFormatW
SetSystemTime
ConnectNamedPipe
GetCurrentDirectoryW
CreateEventA
MulDiv
SetFileTime
GlobalHandle
VerifyVersionInfoW
GetStartupInfoW
LoadLibraryA
GlobalLock
QueryDosDeviceW
GetComputerNameExW
GlobalReAlloc
CreateThread
WaitForSingleObjectEx
FlushFileBuffers
FreeResource
VirtualFree
GetLongPathNameW
CreateSemaphoreW
SystemTimeToFileTime
DeleteAtom
IsValidLocale
WinExec
ResumeThread
WideCharToMultiByte
FindCloseChangeNotification
lstrlenW
GetUserDefaultLCID
CreateFileMappingA
DefineDosDeviceW
InitializeCriticalSection
GetCurrentThread
GlobalFlags
CompareFileTime
GetModuleFileNameA
CreateEventW
HeapUnlock
GetCommState
HeapSize
GetOverlappedResult
GetTempFileNameA
VirtualProtect
FindFirstChangeNotificationW
FoldStringW
ConvertDefaultLocale
SetPriorityClass
SetCommTimeouts
SearchPathW
CopyFileW
GlobalMemoryStatus
GetSystemWindowsDirectoryA
GetDriveTypeA
SetCommMask
GetThreadTimes
GetCommTimeouts
GetPriorityClass
GetSystemTime
MoveFileExW
lstrcpynA
EnumResourceNamesW
MoveFileA
GetThreadPriority
GetCommProperties
GlobalAddAtomA
TlsGetValue
GetSystemDefaultUILanguage
CreateFileA
GetComputerNameExA
GetCommandLineW
CancelIo
SetThreadContext
EscapeCommFunction
SetHandleInformation
GetSystemDirectoryA
IsBadReadPtr
SetNamedPipeHandleState
TryEnterCriticalSection
SetupComm
RemoveDirectoryW
GetFileAttributesExA
GetModuleFileNameW
GetFileAttributesA
OpenSemaphoreW
IsBadCodePtr
lstrcatW
QueryPerformanceCounter
CreateWaitableTimerA
GetTempPathA
TransactNamedPipe
GetOEMCP
Exports
Exports
Sections
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.text Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gdata Size: 1024B - Virtual size: 781B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 558B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ