Static task
static1
Behavioral task
behavioral1
Sample
3b028caa1d24430d0787ec5165c4dae42343ae4841cdeab06d7a36ccdeb74e54.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3b028caa1d24430d0787ec5165c4dae42343ae4841cdeab06d7a36ccdeb74e54.exe
Resource
win10v2004-20230220-en
General
-
Target
3b028caa1d24430d0787ec5165c4dae42343ae4841cdeab06d7a36ccdeb74e54
-
Size
48KB
-
MD5
5bd7118be8247f4795ed1cca7e03802f
-
SHA1
4600bf2f110026df56c7ef6eb4df601e637224dd
-
SHA256
3b028caa1d24430d0787ec5165c4dae42343ae4841cdeab06d7a36ccdeb74e54
-
SHA512
734876c7915035b6e38af95ae6c0dd98f16306ae6c36a68751e095919c01d986a6396d5267778c5998575b4deca4cd54dabf7e24b80d413163f033047c4861d3
-
SSDEEP
768:gX32UZ23qQisyQHBH4VAiX7ubtZmB/k1/THogTNKD:gRQisyQhH4rXOtd17ogTQD
Malware Config
Signatures
Files
-
3b028caa1d24430d0787ec5165c4dae42343ae4841cdeab06d7a36ccdeb74e54.exe windows x86
00b5cc35b148ad3ce778a33a2948baf6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
SetPriorityClass
ResumeThread
GetCurrentThread
GetWindowsDirectoryA
_lclose
_lwrite
GetSystemDirectoryA
CreateProcessA
_lopen
SetThreadPriority
SetCurrentDirectoryA
MoveFileExA
GetModuleFileNameA
GetShortPathNameA
GetVersionExA
lstrlenA
LoadLibraryA
GetProcAddress
FreeLibrary
CloseHandle
SetFilePointer
WriteFile
ReadFile
LocalAlloc
GetCurrentDirectoryA
WritePrivateProfileStringA
LocalFree
lstrcatA
_lread
_llseek
GetLastError
FindFirstFileA
TerminateProcess
DeleteFileA
GetStringTypeW
GetStringTypeA
GetTimeZoneInformation
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
CreateFileA
FreeEnvironmentStringsW
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
SetEnvironmentVariableA
CompareStringW
CompareStringA
HeapCompact
HeapAlloc
HeapFree
RemoveDirectoryA
SetFileAttributesA
GetFileAttributesA
ExitProcess
FreeEnvironmentStringsA
GetStartupInfoA
GetModuleHandleA
FindNextFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
VirtualFree
VirtualAlloc
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
user32
GetSysColor
GetWindow
SendMessageA
MessageBoxA
wsprintfA
SetDlgItemTextA
SetWindowTextA
GetMessageA
EndDialog
DialogBoxParamA
DefWindowProcA
PostQuitMessage
RegisterClassA
LoadCursorA
LoadIconA
CreateWindowExA
DestroyWindow
DispatchMessageA
gdi32
CreateSolidBrush
GetObjectA
SetBkColor
CreateFontIndirectA
RemoveFontResourceA
DeleteObject
GetStockObject
advapi32
RegCloseKey
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
OleUninitialize
OleInitialize
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ