Static task
static1
Behavioral task
behavioral1
Sample
3c827d9ad10b146362007f660baae4cf1a9aaa604927dc59dd338f1848f3825a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3c827d9ad10b146362007f660baae4cf1a9aaa604927dc59dd338f1848f3825a.exe
Resource
win10v2004-20220901-en
General
-
Target
3c827d9ad10b146362007f660baae4cf1a9aaa604927dc59dd338f1848f3825a
-
Size
3.9MB
-
MD5
1d41e4a84f04b2488a7b4478f125a9bd
-
SHA1
19fef90785b0588ae2f990fec4b1dc64cf5be1f4
-
SHA256
3c827d9ad10b146362007f660baae4cf1a9aaa604927dc59dd338f1848f3825a
-
SHA512
dd1da882cb49f67fa95234ad082044bed0dfeec58224ab5848a0457f47cf7d44cad28f424e5e72e0a3ada9f11eaa633bf029a902f8a241ad0c82727c0cc1e562
-
SSDEEP
49152:dfXpGk6FZymh5UwfIXzaBX1mDfE1ssQXwsONsmsmKSopYkR9hgU7tfUO7aTAx:DWFQ69IXzaBX1CfdsQXwNNq93tlR
Malware Config
Signatures
Files
-
3c827d9ad10b146362007f660baae4cf1a9aaa604927dc59dd338f1848f3825a.exe windows x86
dce8652153052ca56aab884edbe4be6b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
PlaySoundA
midiStreamProperty
midiOutPrepareHeader
midiStreamOut
midiStreamStop
midiOutReset
midiStreamClose
midiStreamOpen
midiOutUnprepareHeader
waveOutOpen
waveOutGetNumDevs
waveOutClose
waveOutReset
waveOutPause
waveOutWrite
waveOutPrepareHeader
waveOutUnprepareHeader
midiStreamRestart
ws2_32
setsockopt
shutdown
getservbyname
ntohs
inet_addr
inet_ntoa
gethostbyname
WSAStartup
WSACleanup
WSAGetLastError
getpeername
recv
connect
ioctlsocket
recvfrom
accept
socket
htons
WSAAsyncSelect
closesocket
send
msvfw32
DrawDibDraw
avifil32
AVIStreamInfoA
AVIStreamGetFrame
kernel32
VirtualFree
LocalAlloc
InterlockedIncrement
VirtualQuery
lstrcpynA
GetThreadLocale
GetStartupInfoA
UnhandledExceptionFilter
SetEndOfFile
VirtualAlloc
RaiseException
GetStdHandle
GetFileType
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
GlobalHandle
GetStringTypeExA
GetLocalTime
GetDateFormatA
GetCPInfo
GetACP
FormatMessageA
FileTimeToLocalFileTime
FileTimeToDosDateTime
EnumCalendarInfoA
CompareStringA
FileTimeToSystemTime
DuplicateHandle
FlushFileBuffers
LockFile
UnlockFile
lstrcmpiA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
lstrcmpA
LocalReAlloc
GetFileTime
GetCurrentThread
GlobalFlags
GetProfileIntA
SetErrorMode
GetProcessVersion
GetOEMCP
GetSystemTime
HeapSize
SetStdHandle
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetEnvironmentVariableA
HeapDestroy
HeapCreate
SetEnvironmentVariableW
SetEnvironmentVariableA
LCMapStringA
LCMapStringW
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
CompareStringW
IsBadReadPtr
IsBadCodePtr
IsValidLocale
IsValidCodePage
EnumSystemLocalesA
GetLocaleInfoW
SetNamedPipeHandleState
WaitNamedPipeA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
OpenEventA
WideCharToMultiByte
GetVersion
GetLocaleInfoA
GetTimeZoneInformation
QueryPerformanceCounter
QueryPerformanceFrequency
SetLastError
LoadLibraryExA
GetWindowsDirectoryA
TerminateProcess
GetCurrentProcess
GetFileSize
SetFilePointer
LocalFree
MultiByteToWideChar
InterlockedDecrement
CreateSemaphoreA
ResumeThread
ReleaseSemaphore
EnterCriticalSection
LeaveCriticalSection
GetProfileStringA
WriteFile
ReadFile
GetLastError
WaitForMultipleObjects
CreateFileA
DeviceIoControl
SetEvent
FindResourceA
LoadResource
LockResource
lstrlenW
GetModuleFileNameA
GetCurrentThreadId
ExitProcess
GlobalSize
GlobalFree
DeleteCriticalSection
InitializeCriticalSection
lstrcatA
lstrlenA
WinExec
lstrcpyA
FindNextFileA
GetDriveTypeA
GlobalReAlloc
HeapFree
HeapReAlloc
GetProcessHeap
HeapAlloc
GetUserDefaultLCID
GetFullPathNameA
FreeLibrary
LoadLibraryA
GetVersionExA
WritePrivateProfileStringA
GetPrivateProfileStringA
CreateThread
CreateEventA
ResetEvent
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
FindFirstFileA
FindClose
GetFileAttributesA
CopyFileA
CreateDirectoryA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetVolumeInformationA
GetModuleHandleA
GetProcAddress
GetDiskFreeSpaceA
MulDiv
GetCommandLineA
GetTickCount
WaitForSingleObject
CloseHandle
InterlockedExchange
RtlUnwind
user32
ScrollWindowEx
SendDlgItemMessageA
MapWindowPoints
AdjustWindowRectEx
ScrollWindow
GetScrollInfo
SetScrollInfo
ShowScrollBar
GetScrollPos
RegisterClassA
CreateWindowExA
GetClassLongA
RemovePropA
GetMessageTime
GetLastActivePopup
GetForegroundWindow
RegisterWindowMessageA
GetWindowPlacement
EndDialog
CreateDialogIndirectParamA
DestroyWindow
EndPaint
BeginPaint
CharUpperA
GetWindowTextLengthA
CharNextA
LoadStringA
GetKeyboardType
SetWindowTextA
GetMenuItemCount
GetMenuItemID
GetMenuStringA
GetMenuState
GetTabbedTextExtentA
WindowFromDC
EnumChildWindows
GetWindowDC
UnhookWindowsHookEx
CallNextHookEx
SetWindowsHookExA
GetPropA
MoveWindow
CallWindowProcA
SetPropA
CharToOemA
DrawStateA
GetNextDlgTabItem
GetWindowTextA
GetDlgItem
keybd_event
GetClassNameA
GetDesktopWindow
VkKeyScanExA
GetKeyboardLayout
FrameRect
GetDoubleClickTime
GetCursor
ClipCursor
GrayStringA
DrawTextA
TabbedTextOutA
SystemParametersInfoA
LoadIconA
TranslateMessage
DrawFrameControl
DrawEdge
DrawFocusRect
WindowFromPoint
GetMessageA
DispatchMessageA
SetRectEmpty
RegisterClipboardFormatA
CreateIconFromResourceEx
CreateIconFromResource
DrawIconEx
CreatePopupMenu
IsDialogMessageA
ModifyMenuA
CreateMenu
CreateAcceleratorTableA
GetDlgCtrlID
GetSubMenu
EnableMenuItem
ClientToScreen
EnumDisplaySettingsA
LoadImageA
ShowWindow
IsWindowEnabled
TranslateAcceleratorA
GetKeyState
CopyAcceleratorTableA
PostQuitMessage
IsZoomed
GetSystemMenu
DeleteMenu
GetClassInfoA
DefWindowProcA
GetMenu
PeekMessageA
IsIconic
SetFocus
GetActiveWindow
GetWindow
DestroyAcceleratorTable
SetWindowRgn
GetMessagePos
ScreenToClient
ChildWindowFromPointEx
CopyRect
LoadBitmapA
WinHelpA
KillTimer
SetTimer
ReleaseCapture
GetCapture
SetCapture
GetScrollRange
SetScrollRange
SetScrollPos
SetRect
InflateRect
IntersectRect
DestroyIcon
PtInRect
OffsetRect
IsWindowVisible
EnableWindow
RedrawWindow
GetWindowLongA
SetWindowLongA
GetSysColor
SetActiveWindow
SetCursorPos
LoadCursorA
SetCursor
GetDC
FillRect
InvertRect
IsRectEmpty
ReleaseDC
IsChild
TrackPopupMenu
DestroyMenu
SetForegroundWindow
GetWindowRect
EqualRect
UpdateWindow
ValidateRect
InvalidateRect
CheckMenuItem
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
wvsprintfA
GetSysColorBrush
GetClientRect
GetFocus
GetParent
GetTopWindow
PostMessageA
IsWindow
SetParent
DestroyCursor
SendMessageA
SetWindowPos
MessageBeep
MessageBoxA
GetCursorPos
GetSystemMetrics
IsClipboardFormatAvailable
EmptyClipboard
SetClipboardData
OpenClipboard
GetClipboardData
CloseClipboard
wsprintfA
UnregisterClassA
AppendMenuA
SetMenu
gdi32
GetPolyFillMode
GetStretchBltMode
GetROP2
GetBkColor
GetBkMode
CreateCompatibleBitmap
CreateDCA
GetTextColor
CreateBrushIndirect
CreateHatchBrush
CreateBitmap
CreatePatternBrush
SelectObject
CreatePen
CreateRoundRectRgn
PatBlt
CombineRgn
CreateRectRgn
CreateEllipticRgn
FillRgn
ScaleViewportExtEx
OffsetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
CreateSolidBrush
MoveToEx
LineTo
CreateFontIndirectA
ExtSelectClipRgn
GetViewportExtEx
CopyMetaFileA
SetWindowOrgEx
SetDIBitsToDevice
SetTextColor
SetBkMode
SetBrushOrgEx
CreateFontA
AbortDoc
Escape
GetTextMetricsA
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetStockObject
GetObjectA
EndPage
EndDoc
DeleteDC
StartDocA
StartPage
BitBlt
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetROP2
SetPolyFillMode
CreatePenIndirect
RestoreDC
GetPixel
CreateCompatibleDC
SetPixelV
Ellipse
Rectangle
GetDeviceCaps
GetTextExtentPoint32A
RoundRect
GetCurrentObject
DPtoLP
ExcludeClipRect
LPtoDP
SetBkColor
CreateRectRgnIndirect
CreateDIBSection
SetPixel
ExtCreateRegion
SetStretchBltMode
GetClipRgn
CreatePolygonRgn
SelectClipRgn
DeleteObject
CreateDIBitmap
GetSystemPaletteEntries
CreatePalette
StretchBlt
SelectPalette
RealizePalette
GetDIBits
GetWindowExtEx
GetViewportOrgEx
GetWindowOrgEx
BeginPath
EndPath
PathToRegion
SaveDC
msimg32
GradientFill
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
comdlg32
GetOpenFileNameA
ChooseColorA
ChooseFontA
GetFileTitleA
GetSaveFileNameA
PrintDlgA
advapi32
RegCreateKeyExA
RegQueryValueA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegEnumValueA
shell32
Shell_NotifyIconA
ShellExecuteA
ole32
OleRun
CoCreateInstance
CreateStreamOnHGlobal
CLSIDFromString
OleUninitialize
OleInitialize
CLSIDFromProgID
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
ReleaseStgMedium
OleSetClipboard
OleFlushClipboard
OleIsCurrentClipboard
OleGetClipboard
DoDragDrop
CoLockObjectExternal
RevokeDragDrop
OleDuplicateData
oleaut32
VariantInit
SafeArrayGetElement
SafeArrayAccessData
SysAllocString
SafeArrayCreate
SafeArrayPutElement
RegisterTypeLi
LHashValOfNameSys
LoadTypeLi
UnRegisterTypeLi
VarCyFromR8
VarR8FromCy
SysFreeString
SysReAllocStringLen
SysAllocStringLen
SafeArrayPtrOfIndex
VarBstrFromCy
VarDateFromStr
SafeArrayUnaccessData
VariantCopy
SysStringLen
VariantCopyInd
SafeArrayDestroy
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
VariantChangeType
VariantClear
GetErrorInfo
odbc32
ord12
ord18
ord4
ord48
ord49
ord20
ord17
ord59
ord8
ord44
ord46
ord68
ord72
ord41
ord2
ord1
ord23
ord50
ord45
ord51
ord15
ord9
ord14
ord11
ord10
ord3
ord5
ord16
ord43
ord13
ord61
ord19
comctl32
ImageList_Read
ImageList_DrawIndirect
ImageList_Create
ImageList_Destroy
ImageList_Duplicate
ImageList_AddMasked
ImageList_Draw
ImageList_GetImageInfo
ImageList_GetIcon
ImageList_GetImageCount
ImageList_SetBkColor
_TrackMouseEvent
ord17
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
CODE Size: 331KB - Virtual size: 330KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 840KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ