Static task
static1
Behavioral task
behavioral1
Sample
3f980ec24524276b34a660fd6216aae376e96c6d9e0cb93e443b4fd717899c26.exe
Resource
win7-20220414-en
General
-
Target
3f980ec24524276b34a660fd6216aae376e96c6d9e0cb93e443b4fd717899c26
-
Size
376KB
-
MD5
965714927f0aa267f3c9e885fa2d2923
-
SHA1
10cfbca04f33b9fa93104242001f340461abdf5e
-
SHA256
3f980ec24524276b34a660fd6216aae376e96c6d9e0cb93e443b4fd717899c26
-
SHA512
4f43b3da3ad6cceb03cf84eb8016bd6c188e1a946724ab2f8c8bbec57dc065cf28cf5243cae175cecf793d827c63a69471742a4b015da03874a61387f098a4ba
-
SSDEEP
6144:tFqTpMmb37r+TiZNAqMRQzRZZxKxMFihFAziFQuLNMEC:t0NDmoNAF0RZZxKGIFAziFQuLN
Malware Config
Signatures
Files
-
3f980ec24524276b34a660fd6216aae376e96c6d9e0cb93e443b4fd717899c26.exe windows x86
fd499d619bda8779f56e774da257a7f2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeA
MultiByteToWideChar
LCMapStringA
LCMapStringW
CompareStringA
GetLocaleInfoA
GetStringTypeW
HeapSize
RtlUnwind
VirtualAlloc
CompareStringW
VirtualProtectEx
Sleep
GetCurrentDirectoryA
GetProcessHeap
HeapAlloc
GetSystemDirectoryA
LoadLibraryA
WaitForSingleObject
CreateMutexA
OpenMutexA
DeleteFileA
FindFirstChangeNotificationA
ResetEvent
GetEnvironmentVariableA
GetShortPathNameA
PeekNamedPipe
DuplicateHandle
GetCurrentThread
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
WideCharToMultiByte
GetTimeZoneInformation
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
RaiseException
HeapReAlloc
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetEnvironmentVariableA
user32
SendDlgItemMessageA
InflateRect
SetParent
SetClipboardData
DestroyWindow
EndDeferWindowPos
IsClipboardFormatAvailable
SendMessageA
CheckRadioButton
SetForegroundWindow
IntersectRect
ExitWindowsEx
comctl32
ord17
ImageList_SetOverlayImage
DestroyPropertySheetPage
CreateToolbarEx
ord6
ImageList_LoadImageA
comdlg32
GetSaveFileNameA
ReplaceTextA
GetOpenFileNameA
ole32
OleUninitialize
OleSetContainedObject
OleInitialize
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
AllocateAndInitializeSid
FreeSid
OpenProcessToken
StartServiceCtrlDispatcherA
InitializeSecurityDescriptor
RegEnumKeyA
RegSetValueExA
RegisterServiceCtrlHandlerA
SetServiceStatus
AdjustTokenPrivileges
CloseServiceHandle
ControlService
CreateServiceA
DeleteService
GetTokenInformation
LookupPrivilegeValueA
rasapi32
RasGetConnectStatusA
RasEnumConnectionsA
RasHangUpA
Sections
.text Size: 178KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ