Static task
static1
Behavioral task
behavioral1
Sample
b3d62ee4cde935ac1e53220bb11010f6bd3bb1051389d8934e4d134e3b31eec0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b3d62ee4cde935ac1e53220bb11010f6bd3bb1051389d8934e4d134e3b31eec0.exe
Resource
win10v2004-20220812-en
General
-
Target
b3d62ee4cde935ac1e53220bb11010f6bd3bb1051389d8934e4d134e3b31eec0
-
Size
27KB
-
MD5
6b3d7530443bcb5f6fd81bca82cefbde
-
SHA1
4771f2b694034375a107927ed3efbc7ac6d6cdde
-
SHA256
b3d62ee4cde935ac1e53220bb11010f6bd3bb1051389d8934e4d134e3b31eec0
-
SHA512
08b5a75bc2b9b5c599ffb4c447dd71018beea75f4d5043a9b2306436e0bcfde157d1504e1e476160ba24671069297d0d1a77d1c131c99577b6b72000db6e54e4
-
SSDEEP
384:yBwNzpKTd/clWC9SOBmDZlOXDK/4ytB46o:yB4KThclBXRuw246o
Malware Config
Signatures
Files
-
b3d62ee4cde935ac1e53220bb11010f6bd3bb1051389d8934e4d134e3b31eec0.exe windows x86
15b0a56640142a5e14c54a8465800af2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
CopyFileA
GetModuleFileNameA
SetFileAttributesA
WriteProcessMemory
GetStringTypeA
LCMapStringW
TerminateProcess
GetCurrentProcess
CloseHandle
SetPriorityClass
GetWindowsDirectoryA
Sleep
LCMapStringA
MultiByteToWideChar
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
GetStringTypeW
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
shell32
ShellExecuteA
Sections
.text Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE