Static task
static1
Behavioral task
behavioral1
Sample
3354522abf0ba5c25fd93ef52cde13557584d6f2264daafc169c5f37ba08013c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3354522abf0ba5c25fd93ef52cde13557584d6f2264daafc169c5f37ba08013c.exe
Resource
win10v2004-20220414-en
General
-
Target
3354522abf0ba5c25fd93ef52cde13557584d6f2264daafc169c5f37ba08013c
-
Size
477KB
-
MD5
f6162f7578e8ffa56bb77ef2c285a075
-
SHA1
eedc00b3acf3b31bd28623fa1e892328556661a2
-
SHA256
3354522abf0ba5c25fd93ef52cde13557584d6f2264daafc169c5f37ba08013c
-
SHA512
c05851bc72c044c53c4e4b6363faa5914b1466c4302a1d7e7881578c9e1f755cdb2db4e8e0ecb0153f660a0752286abda941dcba11e810f827c3a56110e8c0a3
-
SSDEEP
6144:+wa5NOxjc8FITZt/06PyW/RRnShahB6IqoEgK/VyW2SO8JpKyvz0Yl19z:+Qc8F6NnRdHEbHvz029z
Malware Config
Signatures
Files
-
3354522abf0ba5c25fd93ef52cde13557584d6f2264daafc169c5f37ba08013c.exe windows x86
12b092dbb0d1d1909ad4bdd2caa0a520
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
TranslateMessage
SetWindowLongA
PeekMessageA
MsgWaitForMultipleObjects
LoadStringA
ExitWindowsEx
DispatchMessageA
DestroyWindow
CreateWindowExA
CallWindowProcA
CharPrevA
GetKeyboardType
LoadStringW
CharNextW
CreateWindowExW
SetWindowLongW
PeekMessageW
MessageBoxW
DispatchMessageW
CharUpperBuffW
CallWindowProcW
advapi32
OpenProcessToken
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
LookupPrivilegeValueW
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryValueExW
RegOpenKeyExW
comctl32
ord17
kernel32
GetSystemTimeAsFileTime
GetCurrentProcessId
HeapCreate
SetHandleCount
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStringTypeW
LCMapStringA
LCMapStringW
InitializeCriticalSectionAndSpinCount
HeapSize
GetEnvironmentStringsW
GetWindowsDirectoryA
GetProcAddress
CreateDirectoryW
CreateEventW
CreateFileW
CreateProcessW
DeleteFileW
EnumCalendarInfoW
FindResourceW
FormatMessageW
GetCPInfo
GetDiskFreeSpaceW
GetEnvironmentVariableW
GetExitCodeProcess
GetFileAttributesW
GetFullPathNameW
GetVersionExW
GetWindowsDirectoryW
LoadLibraryW
RemoveDirectoryW
ResetEvent
SetEvent
SignalObjectAndWait
WaitForSingleObject
UnhandledExceptionFilter
FindClose
FindFirstFileW
FreeLibrary
GetCommandLineW
GetLocaleInfoW
GetModuleFileNameW
GetModuleHandleW
GetStartupInfoA
GetThreadLocale
LoadLibraryExW
lstrcpynW
lstrlenW
GetCurrentThreadId
GetVersion
QueryPerformanceCounter
GetTickCount
GetACP
GetCurrentProcess
GetEnvironmentVariableA
GetSystemDefaultLCID
GetSystemInfo
GetUserDefaultLangID
GetVersionExA
IsDBCSLeadByte
LoadLibraryA
LoadResource
LockResource
RemoveDirectoryA
SetErrorMode
SetLastError
SizeofResource
Sleep
VirtualProtect
VirtualQuery
CloseHandle
CreateFileA
ExitProcess
GetFileType
GetSystemTime
GetFileSize
GetStdHandle
RaiseException
ReadFile
RtlUnwind
SetEndOfFile
SetFilePointer
WriteFile
GetCommandLineA
GetLastError
GetModuleHandleA
MultiByteToWideChar
TlsGetValue
TlsSetValue
WideCharToMultiByte
LocalAlloc
LocalFree
VirtualAlloc
VirtualFree
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
TerminateProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
TlsAlloc
TlsFree
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 385KB - Virtual size: 536KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ