Static task
static1
Behavioral task
behavioral1
Sample
3cbb2dd6b37708bf705d488bc30d5de7.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3cbb2dd6b37708bf705d488bc30d5de7.exe
Resource
win10v2004-20230220-en
General
-
Target
3cbb2dd6b37708bf705d488bc30d5de7.exe
-
Size
350KB
-
MD5
3cbb2dd6b37708bf705d488bc30d5de7
-
SHA1
5035de4c83444f3517421ef71ee3e5fbc05392f2
-
SHA256
09b3105e7f112440192edf2f69ede65fabb1e6e364a96fdfa1e0a8ef8d1ed88a
-
SHA512
3a3b9b8b08bc75c5bb7b5fa3fb66ece066d7100b4d00f78b23e57723c71b24f8953ca4f0d66325ba1b304bea3f112208be337a30a6b4776093ff1ae86444963b
-
SSDEEP
3072:au9GUtRS2/7y7+ZuczfqmNRBECcDl2KXoHO1AeYYOnltu7ezl6WfW226xC8MeKbs:a6G278+ZuCfBtWCeuiOlWxvdTi
Malware Config
Signatures
Files
-
3cbb2dd6b37708bf705d488bc30d5de7.exe.exe windows x86
c56f692e22b19244c7148cdf1cc7a653
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumCalendarInfoA
GetNumaProcessorNode
GetStringTypeA
GetDriveTypeW
SetUnhandledExceptionFilter
InterlockedIncrement
EnumCalendarInfoW
WaitNamedPipeA
WriteConsoleInputA
SetComputerNameW
FreeEnvironmentStringsA
GetModuleHandleW
CreateRemoteThread
EnumResourceTypesA
GetDriveTypeA
SetHandleCount
GetEnvironmentStrings
WideCharToMultiByte
GetPrivateProfileStructW
GetSystemPowerStatus
GetConsoleAliasExesLengthW
SetConsoleCP
GetFileAttributesA
GetComputerNameExA
SetConsoleMode
GetConsoleAliasW
GetVolumePathNameA
FindNextVolumeMountPointW
CreateMailslotW
lstrcmpA
OpenMutexW
InterlockedFlushSList
SetLastError
GetProcAddress
BackupWrite
RemoveDirectoryA
PrepareTape
LoadLibraryA
OpenMutexA
LocalAlloc
SetCalendarInfoW
GlobalGetAtomNameW
GetCommMask
FindAtomA
GetModuleFileNameA
FindNextFileA
GetModuleHandleA
CreateMutexA
RequestWakeupLatency
GetVersionExA
GetDiskFreeSpaceExW
GetCurrentProcessId
GetFileInformationByHandle
GetConsoleProcessList
EnumSystemLocalesW
DeleteFileA
CreateFileW
WriteConsoleW
GetNamedPipeHandleStateW
CreateMutexW
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InterlockedExchange
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
HeapAlloc
HeapReAlloc
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetCPInfo
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
HeapCreate
HeapDestroy
WriteFile
GetStdHandle
GetModuleFileNameW
SetFilePointer
InitializeCriticalSectionAndSpinCount
GetFileType
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryW
GetLocaleInfoW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
GetCurrentThread
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
CloseHandle
user32
GetMenu
advapi32
ReportEventA
Sections
.text Size: 146KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 78KB - Virtual size: 3.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ