Static task
static1
Behavioral task
behavioral1
Sample
3149f9ff606008af22837f9aeb532ce23e512ed20745edff14267b6f426e201b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3149f9ff606008af22837f9aeb532ce23e512ed20745edff14267b6f426e201b.exe
Resource
win10v2004-20220812-en
General
-
Target
3149f9ff606008af22837f9aeb532ce23e512ed20745edff14267b6f426e201b
-
Size
256KB
-
MD5
b7baecebc02fdb879700ec9e08e45248
-
SHA1
48b3af8ec7cadc912dc06b3d91a3049fefd1ffa2
-
SHA256
3149f9ff606008af22837f9aeb532ce23e512ed20745edff14267b6f426e201b
-
SHA512
fcfb21084afb7e5c762dafffa98cc5252192fbcebbc3557114cdcfff4717d7c940ebc2a50c998a97dc603b4ee091bf64bb29423f629b43c7c98bef6f3f910710
-
SSDEEP
6144:3PzIq/w4Xx2okPKebb1/w8c/n1pSA8XaMYL:/zImw4Xx2dZKniXiL
Malware Config
Signatures
Files
-
3149f9ff606008af22837f9aeb532ce23e512ed20745edff14267b6f426e201b.exe windows x86
140add59146e98fe557d0c1e0192d7c3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
VirtualFreeEx
VirtualFree
FindResourceA
LoadResource
LockResource
VirtualAlloc
LoadLibraryA
GetProcAddress
GetCurrentProcess
GetLastError
ReadProcessMemory
OpenProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
Sleep
DuplicateHandle
SizeofResource
GetVersionExA
GetEnvironmentVariableA
WinExec
WriteConsoleW
DecodePointer
FlushFileBuffers
WaitForSingleObject
GetConsoleMode
GetConsoleCP
HeapReAlloc
HeapSize
GetStringTypeW
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
CreateRemoteThread
WriteProcessMemory
SetFilePointerEx
VirtualAllocEx
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
RaiseException
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
GetStdHandle
WriteFile
GetACP
HeapFree
HeapAlloc
GetFileType
LCMapStringW
CreateFileW
user32
EnableWindow
IsDlgButtonChecked
GetDlgItemInt
PostQuitMessage
DestroyWindow
UpdateWindow
LoadIconA
CheckDlgButton
SendDlgItemMessageA
SetDlgItemTextA
GetDlgItem
SetWindowPos
GetDlgItemTextA
TranslateMessage
TranslateAcceleratorA
GetMessageA
LoadAcceleratorsA
LoadStringA
ShowWindow
SendMessageA
MoveWindow
CreateDialogParamA
GetClientRect
wsprintfA
MessageBoxA
DispatchMessageA
advapi32
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
psapi
GetModuleFileNameExA
Sections
.text Size: 161KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 141KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ