Static task
static1
Behavioral task
behavioral1
Sample
3575f47d1f42bf55add44aaf22066831d69a6ac646be1cf5c462c5388676c2e5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3575f47d1f42bf55add44aaf22066831d69a6ac646be1cf5c462c5388676c2e5.exe
Resource
win10v2004-20220812-en
General
-
Target
3575f47d1f42bf55add44aaf22066831d69a6ac646be1cf5c462c5388676c2e5
-
Size
133KB
-
MD5
6bad435f6a0c4039e817f4945226304d
-
SHA1
b82ea87b80a67890b463f712d7145c1d8d00927e
-
SHA256
3575f47d1f42bf55add44aaf22066831d69a6ac646be1cf5c462c5388676c2e5
-
SHA512
282216c2c69c4bfe70d472f40efd0a766d2158995097807243cd3931c91a5279bdeaf7f1535950823b12e932ae71a0a5d46f822e5cafccbf5efb3e647b1a0c79
-
SSDEEP
3072:chUqTlR4v6CBoHuPW7OhjFEPgdb8haGPG0tqqmYP:ilNCi7OhjFEPEsNG0cy
Malware Config
Signatures
Files
-
3575f47d1f42bf55add44aaf22066831d69a6ac646be1cf5c462c5388676c2e5.exe windows x86
373bb91455e386e668a1c3ad07df7dcc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
waveOutClose
waveOutOpen
waveOutWrite
avcodec
avcodec_open
avcodec_encode_audio
av_init_packet
avcodec_close
avpicture_fill
avpicture_get_size
avcodec_alloc_frame
avcodec_encode_video
avcodec_find_encoder
avformat
av_register_all
ord240
ord59
ord40
ord9
ord118
ord232
ord45
av_new_stream
ord21
ord43
avutil
av_free
av_malloc
av_rescale_q
av_d2q
av_freep
mfc90u
ord5167
ord5324
ord5008
ord2208
ord1810
ord1809
ord1675
ord3353
ord6408
ord1754
ord1751
ord4345
ord1492
ord4664
ord5602
ord2074
ord5512
ord6800
ord4603
ord5653
ord3743
ord5154
ord4702
ord1728
ord6466
ord5685
ord5683
ord960
ord965
ord969
ord967
ord971
ord2615
ord2635
ord2619
ord2625
ord2623
ord2621
ord2638
ord2633
ord2617
ord2640
ord2628
ord2610
ord2612
ord2630
ord2375
ord2368
ord1641
ord6802
ord4174
ord6804
ord3682
ord5404
ord6376
ord3226
ord1442
ord5625
ord2139
ord1792
ord1791
ord1727
ord4631
ord3140
ord4910
ord4682
ord3515
ord374
ord4211
ord1098
ord6482
ord794
ord4448
ord4423
ord6801
ord4173
ord6803
ord4747
ord2251
ord2206
ord6035
ord4179
ord1048
ord5548
ord6741
ord5830
ord4213
ord2087
ord3217
ord5674
ord5676
ord2447
ord4347
ord4996
ord5680
ord5663
ord6018
ord2771
ord2983
ord3112
ord4728
ord2966
ord3115
ord2774
ord2893
ord2764
ord4080
ord4081
ord4071
ord2891
ord4348
ord4905
ord4681
ord3670
ord589
ord4967
ord4043
ord1250
ord1254
ord799
ord266
ord1183
ord600
ord296
ord801
ord5632
ord639
ord4000
ord1137
ord280
ord1108
ord811
ord286
ord2695
ord3185
ord4518
ord4519
ord3220
ord285
ord6630
ord524
ord1607
ord744
ord5182
ord2069
ord2478
ord4442
ord4324
ord909
ord6687
ord5650
ord2676
ord2596
ord1272
msvcr90
_except_handler4_common
memcpy
malloc
_purecall
wcscpy
__CxxFrameHandler3
memcmp
exit
_wunlink
free
wcslen
wcscmp
wcscat
_wsplitpath
fclose
ftell
fseek
fread
_wfopen
wcsncpy
_vsnwprintf
wcsrchr
fwprintf
strlen
strcat
strcpy
strcmp
memmove
_snprintf
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
_CxxThrowException
__p__commode
__p__fmode
_encode_pointer
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
?terminate@@YAXXZ
memset
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
__set_app_type
kernel32
GetLastError
WideCharToMultiByte
GetLocalTime
DeleteFileW
GetTempPathW
LoadLibraryW
GetModuleFileNameW
QueryPerformanceCounter
QueryPerformanceFrequency
GetProcAddress
HeapFree
GetFullPathNameW
InterlockedDecrement
LocalAlloc
MoveFileW
GetProcessHeap
VirtualQuery
CloseHandle
WaitForSingleObject
CreateRemoteThread
WriteProcessMemory
VirtualProtectEx
VirtualAllocEx
GetModuleHandleA
ResumeThread
CreateProcessA
SetThreadContext
FlushInstructionCache
GetThreadContext
SuspendThread
CreateProcessW
SetLastError
VirtualProtect
GetCurrentProcess
FreeLibrary
LoadLibraryA
GetModuleHandleW
UnmapViewOfFile
WriteFile
SetFilePointer
MapViewOfFile
CreateFileMappingW
GetFileSize
CreateThread
InterlockedExchange
Sleep
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
user32
SetTimer
MoveWindow
GetMessageW
IsIconic
DrawIcon
GetSystemMetrics
SendMessageW
GetSystemMenu
AppendMenuW
GetDesktopWindow
PostThreadMessageW
LoadIconW
EnableWindow
KillTimer
BeginPaint
EndPaint
PostQuitMessage
SetWindowLongW
GetWindowLongW
DefWindowProcW
GetWindowRect
EqualRect
GetClientRect
GetParent
GetWindowDC
ReleaseDC
RegisterClassExW
CreateWindowExW
SetWindowPos
gdi32
GetDeviceCaps
SelectObject
DeleteDC
CreateCompatibleDC
CreateDCW
CreateDIBSection
BitBlt
GetObjectW
DeleteObject
comctl32
ord17
ole32
CoLoadLibrary
OleCreate
OleSetContainedObject
CoCreateInstance
OleRun
OleDraw
oleaut32
SysFreeString
SysAllocStringLen
SysAllocString
GetErrorInfo
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 51KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ytfnyrl Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE