Static task
static1
Behavioral task
behavioral1
Sample
3f04e53413fb97bb48f256deab5876a3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f04e53413fb97bb48f256deab5876a3.exe
Resource
win10v2004-20231215-en
General
-
Target
3f04e53413fb97bb48f256deab5876a3
-
Size
457KB
-
MD5
3f04e53413fb97bb48f256deab5876a3
-
SHA1
66198113365215c5cb52bd9f559aad75404a7991
-
SHA256
20a3b3307c0c9dff1cbb1b632e625423aac6264d51bc760bd61b9cb2395ae8e4
-
SHA512
4000ae1f8a185a100cb7897d1240f94ff74f6aa76f554b4b3fab04ea9b05d69acba1c7281da58bc8d84f9885051549244f24f929a6eb2995d9f8a32c1867d972
-
SSDEEP
12288:tfKId1PIEBU5+HVwPmC1N70y/wetaZY8Zl1gr7:tf3d1AEO5WSBdPaZZj1gr7
Malware Config
Signatures
Files
-
3f04e53413fb97bb48f256deab5876a3.exe windows:4 windows x86 arch:x86
6b3c6bf7893fe93ad9b4b7dd7c0c5258
Code Sign
8d:e7:2a:c3:b1:87:15:61:2f:8b:13:73:97:89:41:0c:2e:70:46:37Signer
Actual PE Digest8d:e7:2a:c3:b1:87:15:61:2f:8b:13:73:97:89:41:0c:2e:70:46:37Digest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
version
VerQueryValueW
kernel32
GetDefaultCommConfigA
ExitProcess
VirtualAlloc
ReadFile
GetModuleHandleW
GetLastError
GetTickCount
CreateFileMappingA
CloseHandle
FreeResource
FreeLibrary
FindResourceA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
QueryPerformanceCounter
LCMapStringA
GetStringTypeW
GetStringTypeA
LockResource
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapAlloc
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
SetFilePointer
HeapFree
GetVersion
GetSystemTimeAsFileTime
GetCommandLineW
GetStartupInfoA
GetUserDefaultLangID
CreateThread
GetModuleHandleA
GetCommandLineA
GetProcAddress
GetVersionExA
WriteFile
LCMapStringW
MultiByteToWideChar
user32
RegisterClassW
GetDC
InvalidateRect
GetWindowLongA
GetSystemMenu
GetClassInfoA
GetCapture
IntersectRect
GetWindowThreadProcessId
GetSystemMetrics
IsChild
IsIconic
IsRectEmpty
IsWindow
RemovePropA
SetMenu
SetMenuItemInfoA
SetPropA
SetRect
SetScrollInfo
GetWindowPlacement
GetWindowRect
GetClassNameA
GetKeyboardType
GetScrollPos
PtInRect
CreateDialogParamA
LoadStringA
GetClientRect
DialogBoxParamA
CreateWindowExA
MessageBoxA
IsDialogMessageA
gdi32
GetDeviceCaps
SetBkColor
TextOutW
CreatePen
CreatePenIndirect
ExcludeClipRect
Rectangle
GetClipBox
advapi32
GetUserNameA
AllocateLocallyUniqueId
RegCreateKeyExA
RegCloseKey
ole32
CoInitialize
oleaut32
SafeArrayGetUBound
SafeArrayRedim
SafeArrayGetLBound
SafeArrayGetElement
SafeArrayCreate
SysAllocStringLen
SysReAllocStringLen
SafeArrayPutElement
Sections
.text Size: 404KB - Virtual size: 401KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ