Static task
static1
Behavioral task
behavioral1
Sample
3d9f9aed4cda04e705c9756137c6b05402732e55e69c7d5d12decbaf9001e489.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3d9f9aed4cda04e705c9756137c6b05402732e55e69c7d5d12decbaf9001e489.exe
Resource
win10v2004-20220414-en
General
-
Target
3d9f9aed4cda04e705c9756137c6b05402732e55e69c7d5d12decbaf9001e489
-
Size
217KB
-
MD5
67973413b8bad55eda9d488da40b6058
-
SHA1
408079ab6e2e58a01cbd421962517683179d3af3
-
SHA256
3d9f9aed4cda04e705c9756137c6b05402732e55e69c7d5d12decbaf9001e489
-
SHA512
707079ce05c523f0995311e421d3ab5838f61896c99bb3bdc148f66b5effd0685f57ffa694f5d61098b253572b46bc81683ffcb8a5388ea6ce329760732f6d5e
-
SSDEEP
3072:mbnnYZbgQrjK/VKcOuIarq1QjWWF9DuzD4y0P4VQf/+t0BGPAzItUEd:mb2MqjdcOgq6yWzlf/+hPM
Malware Config
Signatures
Files
-
3d9f9aed4cda04e705c9756137c6b05402732e55e69c7d5d12decbaf9001e489.exe windows x86
1344348b1ded38cde8d2aaa69abe50b3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
PrintDlgA
GetSaveFileNameA
CommDlgExtendedError
GetOpenFileNameA
GetFileTitleA
ReplaceTextA
FindTextA
ChooseFontA
ChooseColorA
shell32
SHChangeNotify
ShellExecuteExA
ShellExecuteA
ole32
OleUninitialize
CoTaskMemFree
OleInitialize
advapi32
RegQueryValueA
RegEnumKeyExA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyA
RegQueryInfoKeyA
RegCreateKeyA
RegEnumKeyA
RegSetValueA
RegOpenKeyExA
RegDeleteValueA
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegDeleteKeyA
gdi32
GetStockObject
CreateBitmap
CreateBrushIndirect
DeleteDC
GetTextFaceA
CreateSolidBrush
GetObjectA
comctl32
PropertySheetA
CreatePropertySheetPageA
DestroyPropertySheetPage
ImageList_GetIcon
ImageList_Draw
ImageList_GetImageInfo
ImageList_Create
ImageList_Destroy
_TrackMouseEvent
ImageList_GetImageCount
ImageList_AddMasked
kernel32
RtlUnwind
WriteConsoleA
GetConsoleOutputCP
GetLocaleInfoA
WriteConsoleW
InitializeCriticalSectionAndSpinCount
LoadLibraryA
ReadFile
CreateFileA
CloseHandle
SetLastError
GetProcAddress
WriteProfileStringA
TerminateThread
GetModuleHandleA
GlobalDeleteAtom
MultiByteToWideChar
GlobalAddAtomA
GlobalGetAtomNameA
GlobalFindAtomA
DuplicateHandle
GetCurrentProcess
GetCurrentThreadId
FlushFileBuffers
LockFile
SetFilePointer
SetEndOfFile
MoveFileA
UnlockFile
FindFirstFileA
GetVolumeInformationA
FindClose
GetThreadLocale
GetShortPathNameA
GetStringTypeExA
LocalAlloc
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetPrivateProfileStringA
SetStdHandle
GetFileType
TerminateProcess
GetEnvironmentVariableA
HeapDestroy
HeapSize
VirtualFree
VirtualAlloc
HeapCreate
FatalAppExitA
LCMapStringA
IsBadWritePtr
SetHandleCount
GetStdHandle
LCMapStringW
CompareStringW
UnhandledExceptionFilter
CompareStringA
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStringTypeA
GetStringTypeW
GetEnvironmentStringsW
IsBadReadPtr
SetUnhandledExceptionFilter
IsBadCodePtr
SetEnvironmentVariableA
GetSystemTimeAsFileTime
HeapAlloc
GetCommandLineA
GetStartupInfoA
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetLastError
IsDebuggerPresent
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
Sleep
HeapFree
ExitProcess
HeapReAlloc
GetModuleFileNameA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
Sections
.text Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 102KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ