Static task
static1
Behavioral task
behavioral1
Sample
a3aba9fd37aa75d3765b2968cd21e19de1dc082d6870c03fdd54cf417c890461.exe
Resource
win7-20220812-en
General
-
Target
a3aba9fd37aa75d3765b2968cd21e19de1dc082d6870c03fdd54cf417c890461
-
Size
319KB
-
MD5
3d7ff98cb18d9eb8da1f315dac396c80
-
SHA1
c9d968764501884f0ea4770e1895c2ebba167c73
-
SHA256
a3aba9fd37aa75d3765b2968cd21e19de1dc082d6870c03fdd54cf417c890461
-
SHA512
dc254146f2eece54aee54511a4e8898b98419aba23fa67eb42b961269525c1bdb5003aabc2e2befea4b39aac4e43cae47fe3d151d37007e2aedef372c36a0f00
-
SSDEEP
6144:usU5h9QORbwSeoBU9sULBMk6ce9EVFZuVtL6NqNkt/z/t:usU5PHU9h6tWFZW9Nkt7t
Malware Config
Signatures
Files
-
a3aba9fd37aa75d3765b2968cd21e19de1dc082d6870c03fdd54cf417c890461.exe windows x86
e2949f75a291cabadb22030b78349a66
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetCurrentDirectoryA
GlobalFlags
GlobalAddAtomA
lstrcmpW
GlobalFindAtomA
GlobalGetAtomNameA
GetCPInfo
GetOEMCP
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
RaiseException
ExitProcess
HeapReAlloc
InterlockedDecrement
HeapSize
GetACP
IsValidCodePage
LCMapStringA
LCMapStringW
VirtualFree
HeapCreate
GetStdHandle
SetHandleCount
GetFileType
GetStartupInfoA
GetConsoleCP
GetConsoleMode
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
InitializeCriticalSectionAndSpinCount
GetDriveTypeA
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
CompareStringW
SetEnvironmentVariableA
GetModuleHandleW
GetModuleFileNameW
InterlockedIncrement
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFullPathNameA
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
SetErrorMode
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
CompareStringA
InterlockedExchange
lstrcmpA
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
LocalFree
MultiByteToWideChar
lstrlenA
VirtualAlloc
Sleep
GetTickCount
OutputDebugStringA
SetEvent
UnmapViewOfFile
MapViewOfFile
CreateEventA
CreateFileMappingA
WritePrivateProfileStringA
GetVersionExA
GetTimeZoneInformation
FindClose
FindNextFileA
FindFirstFileA
GetCurrentProcessId
GetCurrentThreadId
CreateFileA
DeleteFileA
CreateDirectoryA
GetLocalTime
GetModuleFileNameA
FormatMessageA
SetUnhandledExceptionFilter
FreeLibrary
Module32First
Process32Next
Process32First
GetProcAddress
LoadLibraryA
TerminateProcess
WaitForSingleObject
CloseHandle
GetLastError
DeleteCriticalSection
EnterCriticalSection
InitializeCriticalSection
LeaveCriticalSection
GetCurrentProcess
SetFileAttributesA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
GetModuleHandleA
GetCommandLineA
user32
DestroyMenu
ShowWindow
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessagePos
MapWindowPoints
SetMenu
GetClientRect
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
GetMenu
SetWindowLongA
SetWindowPos
GetSubMenu
GetMenuItemCount
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
GetWindowTextA
SetWindowTextA
ClientToScreen
GrayStringA
DrawTextExA
GetMessageTime
GetMenuItemID
GetMenuState
PostQuitMessage
PostMessageA
GetSystemMetrics
GetSysColorBrush
GetSysColor
ReleaseDC
GetDC
LoadCursorA
UnhookWindowsHookEx
MessageBoxA
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
DrawTextA
TabbedTextOutA
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetWindowThreadProcessId
SendMessageA
GetParent
SetForegroundWindow
gdi32
GetStockObject
DeleteDC
ScaleWindowExtEx
GetDeviceCaps
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
SetWindowExtEx
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegEnumKeyA
RegDeleteKeyA
RegQueryValueA
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
shlwapi
PathFindExtensionA
PathFindFileNameA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 153KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 97KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE