Static task
static1
Behavioral task
behavioral1
Sample
f3c6a5fcefdcb7217448cdca16932789233e8e7556fa9a6df9131a8869e62f3e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f3c6a5fcefdcb7217448cdca16932789233e8e7556fa9a6df9131a8869e62f3e.exe
Resource
win10v2004-20220901-en
General
-
Target
f3c6a5fcefdcb7217448cdca16932789233e8e7556fa9a6df9131a8869e62f3e
-
Size
315KB
-
MD5
e01d041fea92a5b97e4503570ad9c1eb
-
SHA1
f3b5c355e077f7eca4d663e5b074738d84bc8797
-
SHA256
f3c6a5fcefdcb7217448cdca16932789233e8e7556fa9a6df9131a8869e62f3e
-
SHA512
c7a01a10d07210a96c27a0c059c6a3f29cae42434b46bd3774534e886dd990e7b16ea4a6071d51dc69b8d96e07fda6a4156e29c965e6f3f55dbd5544bb1afc70
-
SSDEEP
6144:h0kHnIfGcj9mb98BOP8dJqPid7TXB9uwtjOUe:h0kHIf3e9KZ7FAUe
Malware Config
Signatures
Files
-
f3c6a5fcefdcb7217448cdca16932789233e8e7556fa9a6df9131a8869e62f3e.exe windows x86
aea9f3e64f6fac1da6b90d767b74241b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStdHandle
GetLastError
CreatePipe
ReadFile
PeekNamedPipe
WaitForSingleObject
GlobalFree
GlobalUnlock
GlobalHandle
GetCommandLineW
GetCommandLineA
LoadLibraryW
GetModuleHandleW
GetVersionExA
GetCurrentProcess
GetCurrentThread
GetProcAddress
FindClose
FindNextFileA
FindFirstFileA
GetModuleFileNameA
CreateThread
CreateFileA
GetEnvironmentVariableA
SetEndOfFile
SetFilePointer
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
lstrcatA
GetWindowsDirectoryA
GetShortPathNameA
CreateDirectoryA
DeleteFileA
SleepEx
GetTempFileNameA
GetFileAttributesA
GetTempPathA
GetDiskFreeSpaceA
WideCharToMultiByte
SetEnvironmentVariableA
GetDriveTypeA
GetLogicalDriveStringsA
RemoveDirectoryA
SetFileAttributesA
CreateProcessA
ResumeThread
SetPriorityClass
SetThreadPriority
MoveFileExA
LocalFree
FormatMessageA
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
SetConsoleCtrlHandler
LoadLibraryA
GetOEMCP
GetACP
GetStringTypeW
GetStringTypeA
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetCPInfo
SetStdHandle
IsBadCodePtr
IsBadReadPtr
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
CompareStringW
LCMapStringW
LCMapStringA
MultiByteToWideChar
HeapSize
HeapReAlloc
TerminateProcess
GetFileType
SetHandleCount
WriteFile
FlushFileBuffers
GetExitCodeProcess
Sleep
GetTickCount
CloseHandle
SetUnhandledExceptionFilter
FatalAppExitA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
TlsGetValue
SetLastError
RtlUnwind
RaiseException
InterlockedDecrement
InterlockedIncrement
GetCurrentDirectoryA
SetCurrentDirectoryA
GetModuleHandleA
GetStartupInfoA
GetVersion
ExitProcess
HeapAlloc
HeapFree
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
user32
DispatchMessageW
ExitWindowsEx
UpdateWindow
DispatchMessageA
TranslateMessage
LoadStringA
wsprintfA
GetWindowRect
GetParent
GetSystemMetrics
MoveWindow
DefWindowProcA
IsWindow
DestroyWindow
PostQuitMessage
CreateDialogParamA
CreateWindowExA
DefWindowProcW
LoadIconA
LoadCursorA
RegisterClassExA
KillTimer
PostMessageA
SetWindowTextA
GetWindowTextA
MessageBoxA
IsWindowVisible
EnableWindow
SetTimer
ShowWindow
GetDlgItem
SendMessageA
SetDlgItemTextA
GetMessageA
GetMessageW
IsDialogMessageA
comdlg32
GetOpenFileNameA
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
shell32
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
CommandLineToArgvW
ole32
CoInitialize
CoUninitialize
Sections
.text Size: 136KB - Virtual size: 135KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ