Static task
static1
Behavioral task
behavioral1
Sample
3550fbe3f0a99646a87058d7b237b32efe9e0564c595664dc89330eeedb03153.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3550fbe3f0a99646a87058d7b237b32efe9e0564c595664dc89330eeedb03153.exe
Resource
win10v2004-20220812-en
General
-
Target
3550fbe3f0a99646a87058d7b237b32efe9e0564c595664dc89330eeedb03153
-
Size
461KB
-
MD5
6d65fa0d5065b263a0de02ed894c23ea
-
SHA1
041e455c6897d4ceac222d227803348140c92fb1
-
SHA256
3550fbe3f0a99646a87058d7b237b32efe9e0564c595664dc89330eeedb03153
-
SHA512
b30fdf835d854c0b4050d9a4fee7792c9683faac6589350c8a257c971fa42e65e4b1fa8af47bb2af6a5709812b8fea50a3fcb6951351f75e7a839113bd12aca9
-
SSDEEP
12288:lp46lIyzem26fIyvRGQQhRM8Xq0WqnuInR:lp46/H2sBv468XA+uIR
Malware Config
Signatures
Files
-
3550fbe3f0a99646a87058d7b237b32efe9e0564c595664dc89330eeedb03153.exe windows x86
a979ee103660f893f4cdf1b36a872df2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
TerminateProcess
ExitThread
CreateThread
HeapSize
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
ExitProcess
LCMapStringW
SetUnhandledExceptionFilter
GetTimeZoneInformation
QueryPerformanceCounter
GetCurrentProcessId
GetOEMCP
GetCPInfo
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
GetStringTypeW
SetStdHandle
GetDriveTypeA
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
RtlUnwind
GetStartupInfoW
GetFileTime
GetFileAttributesW
SetErrorMode
GetCurrentDirectoryW
WritePrivateProfileStringW
InterlockedIncrement
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
GetFullPathNameW
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
WriteFile
lstrcmpiW
FindFirstFileW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileW
FindClose
CreateEventW
SuspendThread
SetEvent
WaitForSingleObject
ResumeThread
SetThreadPriority
GetCurrentThread
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
InterlockedDecrement
SetLastError
GlobalFree
MulDiv
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
LocalFree
lstrcpynW
FreeResource
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
GetModuleHandleA
lstrcmpW
GetModuleHandleW
GetVersionExA
GetModuleFileNameW
SetCurrentDirectoryW
lstrlenA
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetSystemDirectoryW
GetWindowsDirectoryW
LoadLibraryW
FreeLibrary
GetCurrentThreadId
lstrcatW
WinExec
lstrcpyW
GetTickCount
GetLogicalDrives
GetDriveTypeW
CreateFileW
GetDiskFreeSpaceExW
GetVolumeInformationW
GetFileSize
DeviceIoControl
MultiByteToWideChar
FindResourceW
LoadResource
LockResource
SizeofResource
SetFilePointer
ReadFile
CloseHandle
lstrlenW
WideCharToMultiByte
GetLastError
GetVersionExW
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetProcAddress
LCMapStringA
LoadLibraryA
user32
RegisterClipboardFormatW
SetRect
GetSysColorBrush
CharUpperW
SetWindowContextHelpId
MapDialogRect
GetMessageW
TranslateMessage
ValidateRect
PostQuitMessage
WindowFromPoint
wsprintfW
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamW
GetNextDlgTabItem
EndDialog
DestroyMenu
EndPaint
BeginPaint
GrayStringW
DrawTextExW
TabbedTextOutW
SetMenuItemBitmaps
ModifyMenuW
GetMenuState
CheckMenuItem
GetMenuCheckMarkDimensions
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
RegisterWindowMessageW
WinHelpW
CreateWindowExW
SetWindowsHookExW
CallNextHookEx
GetClassInfoExW
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
SendDlgItemMessageW
SendDlgItemMessageA
SetFocus
IsChild
GetWindowTextLengthW
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
PeekMessageW
MessageBoxW
TrackPopupMenu
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
AdjustWindowRectEx
EqualRect
GetScrollInfo
SetScrollInfo
GetClassInfoW
RegisterClassW
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
SetWindowPos
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindow
UnregisterClassW
LoadIconW
PostThreadMessageW
GetSystemMetrics
IsIconic
GetSystemMenu
AppendMenuW
DrawIcon
SetWindowLongW
CopyIcon
LoadCursorW
MessageBeep
GetCursorPos
GetSysColor
IsWindow
GetMessagePos
GetDC
ScreenToClient
SetCursor
LoadBitmapW
GetWindowTextW
DrawTextW
GetWindowDC
ReleaseDC
MapWindowPoints
InflateRect
GetNextDlgGroupItem
InvalidateRgn
CopyAcceleratorTableW
IsRectEmpty
GetFocus
CharNextW
SystemParametersInfoW
GetParent
ClientToScreen
PostMessageW
InsertMenuW
EnableMenuItem
CreatePopupMenu
GetKeyState
ReleaseCapture
GetIconInfo
SendMessageW
GetWindowLongW
EnableWindow
SetCapture
GetCapture
KillTimer
SetTimer
InvalidateRect
GetClientRect
FillRect
PtInRect
CopyRect
DrawStateW
GetWindowRect
OffsetRect
SetWindowRgn
DispatchMessageW
gdi32
DeleteDC
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetRgnBox
ExtSelectClipRgn
MoveToEx
LineTo
ExcludeClipRect
SetMapMode
SetStretchBltMode
RestoreDC
SaveDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
GetDeviceCaps
CreateBitmap
SetBkColor
GetClipBox
GetTextExtentPoint32W
GetTextColor
CreateFontW
GetStockObject
CreateBrushIndirect
SetTextColor
SetBkMode
CreateSolidBrush
Rectangle
SelectObject
CreateFontIndirectW
CreatePen
StretchBlt
BitBlt
FrameRgn
CreateCompatibleDC
GetObjectW
CreateCompatibleBitmap
CreateRoundRectRgn
msimg32
GradientFill
comdlg32
GetOpenFileNameW
GetSaveFileNameW
GetFileTitleW
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
advapi32
RegQueryValueW
RegOpenKeyExW
RegCreateKeyExW
RegQueryValueExW
RegSetValueExW
RegOpenKeyW
RegDeleteKeyW
RegEnumKeyW
RegCloseKey
shell32
ShellExecuteW
comctl32
ord17
shlwapi
PathFindFileNameW
PathStripToRootW
PathFindExtensionW
PathIsUNCW
oledlg
OleUIBusyW
ole32
CoGetClassObject
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
StgOpenStorageOnILockBytes
CoTaskMemFree
CoInitializeEx
CoInitializeSecurity
CoUninitialize
CoCreateInstance
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
oleaut32
OleCreateFontIndirect
SysAllocString
SystemTimeToVariantTime
SafeArrayDestroy
VariantCopy
SysStringLen
SysFreeString
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
Sections
.text Size: 296KB - Virtual size: 294KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 424KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_BSS Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ