Static task
static1
Behavioral task
behavioral1
Sample
3b7940b6c713497d0980e9edbfab9c7423f33dfe7a6f5c370e918af2372942be.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3b7940b6c713497d0980e9edbfab9c7423f33dfe7a6f5c370e918af2372942be.exe
Resource
win10v2004-20220812-en
General
-
Target
3b7940b6c713497d0980e9edbfab9c7423f33dfe7a6f5c370e918af2372942be
-
Size
576KB
-
MD5
6f39a594c7277607b785e37516a40130
-
SHA1
1ef8e904e14d61772d2b0f2ec545c6a2aad7a7a6
-
SHA256
3b7940b6c713497d0980e9edbfab9c7423f33dfe7a6f5c370e918af2372942be
-
SHA512
81767fda6f55d71eaa75386132e1224a48e9361da13fd508b87ac603b3936797a74ea5e4ba42c605f096b85348a99fd7e7cad60a037fafef50820317b8b05bcc
-
SSDEEP
12288:4vAtMrLMzDWBSjQ67fNQb4GoeDuUllhSILXqs76hc:4ojz5HQpoGhSKR76hc
Malware Config
Signatures
Files
-
3b7940b6c713497d0980e9edbfab9c7423f33dfe7a6f5c370e918af2372942be.exe windows x86
fdd5db11d7522e8adfcbed20555a0e8c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
GlobalFlags
GetModuleFileNameW
InterlockedDecrement
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
InterlockedIncrement
ReadFile
SetFilePointer
SetEndOfFile
GetThreadLocale
GetCPInfo
GetOEMCP
SetErrorMode
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GlobalFindAtomA
ExitProcess
HeapReAlloc
VirtualAlloc
GetTimeFormatA
GetDateFormatA
GetSystemTimeAsFileTime
ExitThread
HeapSize
SetStdHandle
GetFileType
GetACP
LCMapStringA
LCMapStringW
GetStdHandle
VirtualFree
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
lstrcmpW
GetCurrentProcessId
SuspendThread
SetThreadPriority
LocalAlloc
GlobalUnlock
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
FindResourceA
SizeofResource
GlobalLock
OpenMutexA
CreateThread
FindResourceExA
LoadResource
LockResource
GetUserDefaultLangID
FormatMessageA
LocalFree
GetStartupInfoA
CreateProcessA
GetExitCodeProcess
TerminateProcess
FlushFileBuffers
GlobalAlloc
GlobalFree
HeapFree
GetProcessHeap
HeapAlloc
GetFileTime
CompareFileTime
WritePrivateProfileStringA
lstrcmpA
DeleteFileA
MoveFileA
GetDriveTypeA
SetLastError
GetVersionExA
GetSystemDirectoryA
GetShortPathNameA
GetTempPathA
GetLocaleInfoA
GetSystemDefaultLangID
InitializeCriticalSection
GetFileSize
DeleteCriticalSection
QueryPerformanceCounter
QueryPerformanceFrequency
WriteFile
OutputDebugStringA
CreateFileA
WaitForSingleObject
ResumeThread
CreateMutexA
GetCommandLineA
GetEnvironmentVariableA
CompareStringW
CompareStringA
GetVersion
WideCharToMultiByte
InterlockedExchange
GlobalGetAtomNameA
Sleep
GetWindowsDirectoryA
FindFirstFileA
FindNextFileA
FindClose
CreateEventA
SetEvent
CloseHandle
GetPrivateProfileStringA
GetCurrentDirectoryA
SetCurrentDirectoryA
lstrlenA
GetProcAddress
GetCurrentProcess
FreeLibrary
LoadLibraryA
GlobalAddAtomA
GlobalDeleteAtom
GetCurrentThreadId
GetTickCount
GetLastError
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleA
GetModuleFileNameA
GetFullPathNameA
GetFileAttributesA
MultiByteToWideChar
RaiseException
user32
UnregisterClassA
DestroyMenu
LoadCursorA
GetSysColorBrush
ShowWindow
LoadIconA
WinHelpA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
GetWindowTextA
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
PtInRect
DefWindowProcA
CallWindowProcA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
GetLastActivePopup
IsWindowEnabled
SetCursor
SetWindowsHookExA
CallNextHookEx
GetActiveWindow
IsWindowVisible
GetKeyState
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
GetParent
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetSysColor
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
MessageBoxA
WaitForInputIdle
MsgWaitForMultipleObjects
PostQuitMessage
GetWindowThreadProcessId
SetWindowTextA
GetSystemMetrics
GetDesktopWindow
GetMessageA
EnableWindow
IsWindow
PostThreadMessageA
GetWindowLongA
GetDC
SetWindowLongA
ReleaseDC
PeekMessageA
TranslateMessage
DispatchMessageA
PostMessageA
SendMessageA
RegisterWindowMessageA
GetDlgCtrlID
RemovePropA
gdi32
DeleteDC
CreateBitmap
GetStockObject
DeleteObject
GetClipBox
SetMapMode
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
SetTextColor
SetBkColor
RestoreDC
SaveDC
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegQueryValueA
RegEnumKeyA
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCreateKeyExA
RegOpenKeyA
RegDeleteKeyA
RegSetValueExA
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
LookupAccountSidA
FreeSid
RegOpenKeyExA
RegQueryValueExA
shlwapi
PathFindFileNameA
PathFindExtensionA
oleaut32
VariantInit
VariantChangeType
VariantClear
Sections
.text Size: 244KB - Virtual size: 243KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tc Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE