Static task
static1
Behavioral task
behavioral1
Sample
d3752092260b971fbfc318e7bf80877a7c8b4de523cbde341be119da4f308829.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d3752092260b971fbfc318e7bf80877a7c8b4de523cbde341be119da4f308829.exe
Resource
win10v2004-20221111-en
General
-
Target
d3752092260b971fbfc318e7bf80877a7c8b4de523cbde341be119da4f308829
-
Size
158KB
-
MD5
074ada3318fa43f81e22e3f43acdae5d
-
SHA1
3d0e895bd56f981ebe0a8cc996d1f18393b56ac9
-
SHA256
d3752092260b971fbfc318e7bf80877a7c8b4de523cbde341be119da4f308829
-
SHA512
0913c62b51e534063e0d7003345813545a7629830e7122a2f203c134c1399ddeaf658cc10602dbb6c5765942b118d23e927146707efd507d6ab0ff01229a9cbe
-
SSDEEP
3072:zb8LZp3na3e+VW0j56stI+HD6cop48HE/6rWseGDT1Z4/:X8LO356stl2HFE/6NX1i
Malware Config
Signatures
Files
-
d3752092260b971fbfc318e7bf80877a7c8b4de523cbde341be119da4f308829.exe windows x86
0ad0a4ba89ef63f61e3aa4cbef5affa1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenEventW
RaiseException
lstrcmpiW
FindNextFileW
HeapReAlloc
VirtualQuery
GetModuleFileNameW
GetTickCount
FindClose
WriteFile
GetSystemDirectoryW
GetPrivateProfileStringW
ExpandEnvironmentStringsW
CreateDirectoryW
ReadFile
GetStartupInfoA
GetTempPathW
SetHandleInformation
GetWindowsDirectoryW
WaitForSingleObject
CreateProcessW
SetCommMask
LocalAlloc
WideCharToMultiByte
GetDateFormatW
CreateFileW
CopyFileW
FormatMessageA
GetCurrentDirectoryW
GetModuleHandleA
LocalReAlloc
InterlockedIncrement
GlobalFree
GetLogicalDriveStringsW
GetVolumeInformationW
LoadLibraryW
CreateMutexW
MultiByteToWideChar
GetCommandLineW
GetFileAttributesW
InterlockedExchange
DeleteFileW
lstrlenA
GetProcessHeap
GetPrivateProfileIntW
QueryPerformanceCounter
GetFullPathNameW
SetLastError
GetTimeFormatW
LocalFree
GetModuleHandleA
GetLastError
FreeLibrary
OpenMutexW
QueryDosDeviceW
lstrcmpW
GetPrivateProfileSectionW
GetExitCodeProcess
CloseHandle
HeapSize
ReleaseMutex
LoadLibraryA
GetVersionExA
Sleep
SetCurrentDirectoryW
FormatMessageW
lstrlenW
DeviceIoControl
GetCurrentThreadId
SetFilePointer
GetSystemTimeAsFileTime
IsValidLocale
FindFirstFileW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapAlloc
GetCurrentProcess
GetProcAddress
GlobalAlloc
GetDiskFreeSpaceExW
GetDriveTypeW
InterlockedDecrement
HeapFree
IsProcessorFeaturePresent
GetCurrentProcessId
oleaut32
DllUnregisterServer
RegisterActiveObject
GetActiveObject
advapi32
RegisterServiceCtrlHandlerA
RegisterEventSourceA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
DeregisterEventSource
ole32
CoTaskMemFree
CoCreateInstance
GetRunningObjectTable
CoInitialize
CreateItemMoniker
CoUninitialize
shell32
Shell_NotifyIconA
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ojzfuw Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 139KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ