Static task
static1
Behavioral task
behavioral1
Sample
3457e6b6395aa27e1a630fb6e0132531cd1c74d1d03b209e81d55dacd9bdc7a7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3457e6b6395aa27e1a630fb6e0132531cd1c74d1d03b209e81d55dacd9bdc7a7.exe
Resource
win10v2004-20220812-en
General
-
Target
3457e6b6395aa27e1a630fb6e0132531cd1c74d1d03b209e81d55dacd9bdc7a7
-
Size
656KB
-
MD5
3c29da3d34daccf9869733764511c530
-
SHA1
4a8327b0d9fbc5f529ff7dbc1e09b9be8cb5d888
-
SHA256
3457e6b6395aa27e1a630fb6e0132531cd1c74d1d03b209e81d55dacd9bdc7a7
-
SHA512
192acd77a386e1bf59e7aaeb7b5a31e3784c82f580a1203f228313bf481b9f18ecd35a0377ebffe8578bb849691d5826ca6722c2f1a6f02979ce79ace1ca6ed9
-
SSDEEP
12288:mxfsA4ENwBaRJTMupnTotznHrtIIDRNhV/7pVNQnmnBm:S0uOedLn8rIMRR7nNnn
Malware Config
Signatures
Files
-
3457e6b6395aa27e1a630fb6e0132531cd1c74d1d03b209e81d55dacd9bdc7a7.exe windows x86
e68f7c62fd5fd2d9e398fe437ee49944
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
urlmon
URLDownloadToCacheFileW
GetComponentIDFromCLSSPEC
CoInternetGetSecurityUrl
URLDownloadToFileW
HlinkGoBack
CoInternetParseUrl
UrlMkSetSessionOption
URLDownloadToFileA
HlinkNavigateMoniker
URLOpenBlockingStreamA
RevokeBindStatusCallback
FindMimeFromData
CreateAsyncBindCtx
CoInternetCreateSecurityManager
clusapi
CloseClusterResource
GetClusterKey
ClusterRegOpenKey
ClusterRegSetValue
BackupClusterDatabase
GetClusterResourceTypeKey
OfflineClusterResource
ClusterRegGetKeySecurity
ClusterGroupCloseEnum
ClusterOpenEnum
ClusterEnum
GetClusterFromNetInterface
OnlineClusterGroup
AddClusterResourceNode
user32
FindWindowW
SetDlgItemTextW
SetWindowLongW
GetWindowTextW
PtInRect
IsCharAlphaW
EnumDisplayDevicesW
LoadStringW
DrawTextA
IsWindow
MoveWindow
TabbedTextOutW
WindowFromPoint
MessageBeep
DrawEdge
OpenInputDesktop
wsprintfW
ShowWindow
ScreenToClient
LoadCursorW
GetClassLongA
FillRect
AnimateWindow
mprapi
MprAdminTransportSetInfo
MprConfigTransportGetInfo
MprConfigInterfaceTransportAdd
MprInfoBlockAdd
MprConfigTransportCreate
MprAdminTransportGetInfo
MprConfigInterfaceCreate
MprAdminMIBEntryGet
MprAdminUserSetInfo
MprInfoBlockSet
MprAdminConnectionClearStats
MprAdminInterfaceGetInfo
MprAdminDeviceEnum
oleaut32
VarR4FromCy
VarUI2FromStr
VarR8FromBool
VarI4FromR4
LPSAFEARRAY_UserMarshal
VarCyRound
SafeArraySetRecordInfo
LPSAFEARRAY_UserSize
VarR4CmpR8
VarUI4FromBool
GetErrorInfo
shell32
Shell_NotifyIconA
ShellExecuteExW
DragQueryFileW
ExtractIconW
ExtractAssociatedIconExW
DragAcceptFiles
SHQueryRecycleBinW
ord180
ExtractAssociatedIconW
ord179
DragQueryFileA
SHGetFileInfoA
SHAppBarMessage
SHLoadNonloadedIconOverlayIdentifiers
pdh
PdhAddCounterA
PdhGetDataSourceTimeRangeA
PdhUpdateLogA
PdhCollectQueryData
PdhMakeCounterPathW
PdhCollectQueryDataEx
PdhCloseQuery
PdhGetLogFileSize
PdhGetCounterTimeBase
PdhLookupPerfNameByIndexW
PdhRemoveCounter
PdhGetCounterInfoW
PdhCalculateCounterFromRawValue
PdhOpenQueryA
ole32
CoCreateInstance
kernel32
InitializeCriticalSection
GetModuleHandleW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FlushFileBuffers
GetSystemInfo
VirtualQuery
SetConsoleCtrlHandler
GetConsoleOutputCP
SetEndOfFile
GetLocaleInfoW
SetEnvironmentVariableA
RaiseException
GetCurrentActCtx
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
GetModuleFileNameA
SetUnhandledExceptionFilter
WriteFile
SetStdHandle
CloseHandle
IsValidCodePage
IsValidLocale
RtlUnwind
HeapSize
GetStringTypeW
GetStringTypeA
LCMapStringW
HeapReAlloc
VirtualAlloc
HeapDestroy
ReadFile
CompareStringW
GetTimeFormatA
GetACP
SetFilePointer
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsGetValue
OutputDebugStringA
EnterCriticalSection
GetCommandLineA
InterlockedIncrement
HeapFree
FreeConsole
GetConsoleTitleW
lstrlenA
CopyFileExW
GetCompressedFileSizeW
GetLocalTime
SetFilePointerEx
GetCommConfig
WriteConsoleOutputCharacterW
SetThreadExecutionState
IsProcessorFeaturePresent
GlobalGetAtomNameW
GetLogicalDriveStringsA
GetCompressedFileSizeA
GetSystemDefaultLCID
GetWindowsDirectoryA
FindResourceW
SetFileAttributesW
VirtualProtectEx
FreeLibraryAndExitThread
GetTickCount
GetPrivateProfileStructW
SetSystemPowerState
UpdateResourceA
FindFirstFileExA
GetFileType
SetConsoleTextAttribute
LeaveCriticalSection
ReadConsoleA
GetConsoleCP
GetComputerNameExW
RequestWakeupLatency
CreateTapePartition
FillConsoleOutputAttribute
GetStartupInfoA
LocalHandle
EnumResourceNamesA
RemoveVectoredExceptionHandler
DuplicateHandle
FindNextVolumeMountPointW
MultiByteToWideChar
WriteProfileSectionA
GetTempPathW
SetComputerNameA
EnumDateFormatsExA
ExpandEnvironmentStringsA
GetEnvironmentVariableA
OutputDebugStringW
SetCurrentDirectoryW
GetVolumeNameForVolumeMountPointA
SetCalendarInfoW
ChangeTimerQueueTimer
DosDateTimeToFileTime
FormatMessageW
GetWriteWatch
EnumResourceLanguagesW
GetProfileSectionW
lstrcmpiA
DeleteVolumeMountPointW
OpenEventA
Module32Next
InterlockedExchangeAdd
SetProcessWorkingSetSize
GetProfileSectionA
CreateMemoryResourceNotification
ScrollConsoleScreenBufferW
VerLanguageNameW
WritePrivateProfileSectionW
GetProfileIntA
EnumSystemLanguageGroupsW
GetLongPathNameA
GetCommMask
GlobalFindAtomW
FindFirstChangeNotificationW
BeginUpdateResourceA
SetProcessAffinityMask
IsProcessInJob
FormatMessageA
DecodeSystemPointer
InterlockedFlushSList
AllocConsole
MapUserPhysicalPages
EnumResourceLanguagesA
DnsHostnameToComputerNameW
GetHandleInformation
GetCurrentThread
GetStdHandle
GlobalMemoryStatusEx
ReplaceFileA
GetVersionExA
BuildCommDCBW
EnumTimeFormatsW
SetCommConfig
SetMessageWaitingIndicator
CreateWaitableTimerW
SetSystemTime
ReleaseMutex
GetThreadContext
FindFirstFileA
GetThreadSelectorEntry
InterlockedExchange
GetDevicePowerState
CreateFiberEx
GetFullPathNameW
CreateFileA
ReadConsoleInputW
FindFirstVolumeA
Process32NextW
HeapAlloc
lstrcmpA
FlushConsoleInputBuffer
EnumSystemLanguageGroupsA
GetFileAttributesExA
SetVolumeMountPointA
SetFileAttributesA
DeleteCriticalSection
ReadConsoleOutputAttribute
GetPrivateProfileIntA
CompareFileTime
GetPrivateProfileSectionW
GetDateFormatA
GetNumberOfConsoleMouseButtons
EnumCalendarInfoW
DebugActiveProcessStop
FindFirstFileW
UpdateResourceW
GetSystemTimeAdjustment
TerminateThread
CancelTimerQueueTimer
FillConsoleOutputCharacterW
ZombifyActCtx
GlobalReAlloc
GetCalendarInfoA
FindResourceExW
ScrollConsoleScreenBufferA
DebugBreakProcess
CreateHardLinkW
GetCurrentProcessId
GetProcAddress
ReadConsoleOutputCharacterA
CreateIoCompletionPort
FindNextVolumeW
SetInformationJobObject
OpenJobObjectA
EnumSystemCodePagesA
PulseEvent
MapViewOfFileEx
EnumSystemLocalesA
GlobalUnfix
GetNamedPipeHandleStateW
SetThreadIdealProcessor
DeleteTimerQueueEx
WriteProfileSectionW
CreateTimerQueueTimer
GetSystemDefaultLangID
FindNextFileW
BackupSeek
GetLogicalDriveStringsW
GetProcessHeap
ResetEvent
ReadFileScatter
FillConsoleOutputCharacterA
GetAtomNameA
GetCommState
CreateMailslotW
SetHandleInformation
FlushViewOfFile
EscapeCommFunction
RegisterWaitForSingleObjectEx
GetCommandLineW
FreeUserPhysicalPages
GetConsoleTitleA
IsBadStringPtrW
GetLocaleInfoA
AssignProcessToJobObject
MoveFileExW
Heap32ListNext
SetCurrentDirectoryA
SetLocaleInfoW
SetConsoleScreenBufferSize
GetCurrencyFormatA
OpenMutexW
IsValidLanguageGroup
SetEnvironmentVariableW
MoveFileWithProgressA
WaitForMultipleObjects
OpenEventW
CreateActCtxW
GetTempPathA
LocalFree
FindActCtxSectionStringA
OpenWaitableTimerW
FatalAppExitW
GetThreadTimes
SwitchToFiber
EnumResourceNamesW
ProcessIdToSessionId
GetComputerNameA
GetCPInfoExW
GetStringTypeExW
SetTapePosition
FindFirstChangeNotificationA
GetStringTypeExA
GetFileSizeEx
ActivateActCtx
CheckRemoteDebuggerPresent
OpenFileMappingW
GlobalFree
EnumTimeFormatsA
GetShortPathNameW
GetCommModemStatus
OpenSemaphoreA
EraseTape
lstrcatA
lstrcatW
WritePrivateProfileSectionA
CreateDirectoryW
BackupRead
GetDiskFreeSpaceA
ReleaseSemaphore
lstrcmpiW
GetSystemWow64DirectoryA
GetDriveTypeW
GetVolumePathNameA
InitializeCriticalSectionAndSpinCount
GetConsoleCursorInfo
Thread32First
IsSystemResumeAutomatic
CancelWaitableTimer
GetNumberFormatW
DefineDosDeviceA
GlobalUnlock
GetConsoleWindow
GlobalAlloc
LockFile
LoadLibraryW
GlobalMemoryStatus
SetDefaultCommConfigA
DeviceIoControl
LocalAlloc
GetTimeZoneInformation
lstrcpynA
VirtualFree
TlsAlloc
SystemTimeToTzSpecificLocalTime
AddAtomA
SetFileShortNameW
GetWindowsDirectoryW
InterlockedDecrement
GlobalDeleteAtom
QueryPerformanceFrequency
VirtualProtect
BackupWrite
GetOEMCP
GetModuleHandleA
GetDiskFreeSpaceExA
GlobalLock
GetCommTimeouts
GetCurrencyFormatW
SetHandleCount
IsBadReadPtr
Toolhelp32ReadProcessMemory
RemoveDirectoryA
GetConsoleFontSize
GlobalWire
lstrcpyA
ConnectNamedPipe
EnumSystemGeoID
GetFileTime
GetSystemTimeAsFileTime
FindAtomA
GetFileSize
FreeLibrary
GlobalFindAtomA
ConvertDefaultLocale
UnlockFileEx
GetProcessHandleCount
GetSystemWindowsDirectoryA
GetVolumePathNamesForVolumeNameA
QueryDepthSList
LocalUnlock
ReplaceFileW
CompareStringA
SetEvent
GetConsoleMode
GetComputerNameExA
MoveFileExA
SuspendThread
TransmitCommChar
ReadProcessMemory
GlobalGetAtomNameA
DecodePointer
FreeEnvironmentStringsA
DeleteAtom
GetFirmwareEnvironmentVariableA
Sleep
WritePrivateProfileStructA
SetFileTime
PurgeComm
GetCPInfoExA
IsBadStringPtrA
LocalShrink
GetSystemPowerStatus
CreateEventW
GetProcessIoCounters
GetCPInfo
GetShortPathNameA
SetCalendarInfoA
IsBadHugeWritePtr
HeapLock
PeekConsoleInputW
IsBadCodePtr
GetVersion
EnumSystemCodePagesW
LocalFlags
SetTimeZoneInformation
CopyFileA
FatalAppExitA
CreateProcessA
LoadLibraryExW
LoadLibraryA
CreateSemaphoreW
LCMapStringA
EnumLanguageGroupLocalesA
GetVolumePathNameW
SetConsoleWindowInfo
DeleteFileA
Thread32Next
GetDiskFreeSpaceW
FileTimeToDosDateTime
SetProcessShutdownParameters
WriteConsoleInputW
EnumUILanguagesW
DebugActiveProcess
CreateNamedPipeW
SizeofResource
GetConsoleDisplayMode
WriteConsoleW
GetPrivateProfileStringA
EncodePointer
ExitProcess
InitializeSListHead
EnumDateFormatsExW
SetLocaleInfoA
HeapCreate
VirtualQueryEx
WriteFileGather
EndUpdateResourceA
WriteConsoleA
Heap32Next
WideCharToMultiByte
CallNamedPipeW
GetUserDefaultLCID
GetProcessAffinityMask
LocalReAlloc
ReadDirectoryChangesW
GetUserDefaultUILanguage
lstrcmpW
GetPrivateProfileSectionNamesA
GetLastError
OpenFile
VirtualLock
MoveFileA
OpenFileMappingA
SetupComm
SetFileShortNameA
SetFirmwareEnvironmentVariableA
VerifyVersionInfoA
FindAtomW
FileTimeToLocalFileTime
CreateMutexW
HeapCompact
HeapUnlock
SetSystemTimeAdjustment
GetPrivateProfileStructA
Sections
.textbss Size: 212KB - Virtual size: 209KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CRI!| Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CODE Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CONST Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rWm:H) Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dBzfuK Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
x%a{~8 Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
(YPw Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.crt Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.erloc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
P Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.crt1 Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
AssHx Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE