Static task
static1
Behavioral task
behavioral1
Sample
3555e2b4648464f2b21a299ff9309a708f00ad293f6260f5149f94e2b6050936.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3555e2b4648464f2b21a299ff9309a708f00ad293f6260f5149f94e2b6050936.exe
Resource
win10v2004-20220812-en
General
-
Target
3555e2b4648464f2b21a299ff9309a708f00ad293f6260f5149f94e2b6050936
-
Size
256KB
-
MD5
63508ec688db1f527399561b66c722fb
-
SHA1
26cd75269229f899d7140f7e98ddc168b80f5e27
-
SHA256
3555e2b4648464f2b21a299ff9309a708f00ad293f6260f5149f94e2b6050936
-
SHA512
762d908a20d6ed3d8ea994e60e06912bab7eff5a3b7afde2e4d81ab421399d616ff57169969c9cf630c31aab3d3c3e1b17d41004beebdcf0eda86cd2c6622ca2
-
SSDEEP
3072:ounkCozlVJoeQ2yql7M86xNgqKMThW8/9Io8lKuNTsQpg87usQRm5k7+:oGkCoxHoyyKM7uNTn7uI5
Malware Config
Signatures
Files
-
3555e2b4648464f2b21a299ff9309a708f00ad293f6260f5149f94e2b6050936.exe windows x86
4c66fb03c077fc7a228a2749265c3591
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SystemTimeToFileTime
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
MoveFileA
DeleteFileA
FindClose
FindFirstFileA
GetVolumeInformationA
GetStringTypeExA
GetThreadLocale
GetShortPathNameA
GetFileSize
GetCurrentProcess
CreateFileA
SetErrorMode
RtlUnwind
RaiseException
ExitProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
HeapAlloc
HeapFree
GetTimeZoneInformation
GetACP
HeapReAlloc
LocalFileTimeToFileTime
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetOEMCP
DuplicateHandle
GetFullPathNameA
LockResource
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
CreateProcessA
GetTickCount
Sleep
CloseHandle
CreateMutexA
GetLastError
GlobalFindAtomA
GlobalDeleteAtom
WaitForSingleObject
CreateFileMappingA
ReleaseMutex
MapViewOfFile
SearchPathA
GetCurrentDirectoryA
UnmapViewOfFile
GlobalFlags
GetCPInfo
GetProcessVersion
LocalReAlloc
MulDiv
TlsGetValue
TlsFree
TlsSetValue
GlobalReAlloc
LocalAlloc
GlobalHandle
TlsAlloc
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
LocalFree
InitializeCriticalSection
SetFileTime
GetDiskFreeSpaceA
GetFileTime
FreeEnvironmentStringsW
GetFileAttributesA
GetTempFileNameA
GetSystemDefaultLangID
GlobalAddAtomA
CreateEventA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetCurrentThread
GlobalAlloc
lstrcmpA
LoadLibraryA
GlobalFree
GetModuleFileNameA
LoadResource
FreeLibrary
FindResourceA
GetEnvironmentStrings
GetCurrentThreadId
GetPrivateProfileIntA
lstrcmpiA
GetModuleHandleA
GetProcAddress
GlobalLock
GlobalUnlock
GlobalGetAtomNameA
GetVersion
FileTimeToLocalFileTime
FileTimeToSystemTime
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
lstrcpynA
SetLastError
lstrcpyA
GetSystemDirectoryA
lstrcatA
ResetEvent
SetEvent
GetEnvironmentStringsW
SetHandleCount
HeapSize
user32
EndDeferWindowPos
DeferWindowPos
ScreenToClient
AdjustWindowRectEx
DispatchMessageA
GetSysColor
MapWindowPoints
SendDlgItemMessageA
IsDialogMessageA
SetWindowTextA
GetNextDlgTabItem
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
CreateDialogIndirectParamA
EndDialog
PostQuitMessage
ShowOwnedPopups
GetCursorPos
ValidateRect
TranslateMessage
GetMessageA
LoadStringA
GetClassNameA
PtInRect
ClientToScreen
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
InsertMenuA
DeleteMenu
GetMenuStringA
DestroyIcon
CharUpperA
GetTopWindow
MessageBoxA
BeginDeferWindowPos
GetClientRect
GetWindowTextA
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetLastActivePopup
BringWindowToTop
IsWindowVisible
IsIconic
GetFocus
EqualRect
CopyRect
GetDlgItem
InvalidateRect
SetWindowLongA
GetKeyState
SetWindowPos
GetMenuItemCount
GetSubMenu
GetMenuItemID
UnpackDDElParam
ReuseDDElParam
SetActiveWindow
WinHelpA
SetMenu
GetMenu
GetClassInfoA
LoadMenuA
DestroyMenu
SetFocus
GetParent
GetActiveWindow
ShowWindow
GetWindowLongA
IsWindow
GetDesktopWindow
GetWindow
IsWindowEnabled
SetCursor
PeekMessageA
GetCapture
ReleaseCapture
TranslateAcceleratorA
LoadAcceleratorsA
SetRectEmpty
RegisterWindowMessageA
RegisterClassA
IsChild
DestroyWindow
WaitForInputIdle
FindWindowA
FindWindowExA
PostMessageA
KillTimer
SetTimer
SetForegroundWindow
EnableWindow
LoadIconA
SendMessageA
wsprintfA
UpdateWindow
GetDlgCtrlID
UnregisterClassA
gdi32
GetClipBox
SetBkColor
GetObjectA
CreateBitmap
DeleteObject
GetDeviceCaps
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
RectVisible
TextOutA
PtVisible
Escape
ExtTextOutA
SetTextColor
comdlg32
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegSetValueA
RegSetValueExA
RegDeleteValueA
RegCreateKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
SetFileSecurityA
GetFileSecurityA
RegDeleteKeyA
RegQueryValueA
RegEnumKeyA
RegOpenKeyA
shell32
ShellExecuteA
DragFinish
DragQueryFileA
ExtractIconA
SHGetFileInfoA
comctl32
ord17
wsock32
recvfrom
WSAGetLastError
closesocket
socket
select
inet_addr
sendto
WSACleanup
htons
gethostbyname
ioctlsocket
WSAStartup
Sections
.text Size: 136KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE