Static task
static1
Behavioral task
behavioral1
Sample
f3c6ee2eff30df540acd2a28c13d272571168790d6d770f7d4dd7a0c909629e4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f3c6ee2eff30df540acd2a28c13d272571168790d6d770f7d4dd7a0c909629e4.exe
Resource
win10v2004-20220812-en
General
-
Target
f3c6ee2eff30df540acd2a28c13d272571168790d6d770f7d4dd7a0c909629e4
-
Size
808KB
-
MD5
744121e1831517b7b743f031fec4cbf0
-
SHA1
91da2fe50976732961f7ce1d0ffe06ae367e6e03
-
SHA256
f3c6ee2eff30df540acd2a28c13d272571168790d6d770f7d4dd7a0c909629e4
-
SHA512
25ee8dde9d89d16cc2120110de25baed55d6c918141cf8eb5fd6415a8eefa19d00842cfb9636748f386b2065b350605229017b4e310c4ad9e3f7571f90931f20
-
SSDEEP
6144:yBCboVwVUb6NBFs4Aqp/cSH/uPUVsTxJqQgGo3Kx+:xUwBFs4hpJHGcVyJvI
Malware Config
Signatures
Files
-
f3c6ee2eff30df540acd2a28c13d272571168790d6d770f7d4dd7a0c909629e4.exe windows x86
a39a515d762b9860a94982d57d52c96e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHEmptyRecycleBinA
SHQueryRecycleBinA
SHGetSpecialFolderPathA
psapi
EnumProcesses
GetModuleFileNameExA
EnumProcessModules
ds_device
?GetProgramName@ds_tools@@SAHPAD@Z
?GetDiskFull@ds_tools@@SAHPAH@Z
?GetRepairModel@ds_tools@@SAHPAH@Z
ProcessProtectAddRule
?IsWorking@ds_tools@@SAHXZ
?IsSupport@ds_tools@@SAHXZ
?DSExist@ds_tools@@SAHXZ
?GetFreeDisk@ds_tools@@SAHPAT_LARGE_INTEGER@@@Z
?CleanDisk@ds_tools@@SAHXZ
?IsAdmin@ds_tools@@SAHXZ
skinst
?SkinLoadSkin@@YGHPBDH@Z
?RemoveWindowSkin@@YGXPAUHWND__@@@Z
kernel32
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
FindClose
FindFirstFileA
GetVolumeInformationA
GetFullPathNameA
CreateFileA
SetErrorMode
GetTickCount
FileTimeToLocalFileTime
GetFileAttributesA
GetFileTime
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
GetCommandLineA
GetOEMCP
GetStartupInfoA
RtlUnwind
RaiseException
ExitProcess
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
GetACP
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetLocaleInfoW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GetCPInfo
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
FileTimeToSystemTime
GetThreadLocale
InterlockedDecrement
GetModuleFileNameW
WritePrivateProfileStringA
GetCurrentThread
ConvertDefaultLocale
GetModuleFileNameA
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalAlloc
FormatMessageA
LocalFree
MulDiv
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
FreeLibrary
lstrcmpW
GetVersionExA
SetLastError
GetProcAddress
GetModuleHandleA
LoadLibraryA
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetVersion
CompareStringA
InterlockedExchange
MultiByteToWideChar
CompareStringW
lstrlenA
GetCurrentProcess
TerminateProcess
OpenProcess
CloseHandle
GetCurrentProcessId
GetCurrentDirectoryA
GetLastError
CreateMutexA
CreateThread
GetDriveTypeA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
GetLogicalDrives
lstrcpyA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
GetProcessHeap
user32
GetNextDlgGroupItem
MessageBeep
UnregisterClassA
RegisterClipboardFormatA
PostThreadMessageA
CopyAcceleratorTableA
CharNextA
ReleaseCapture
SetCapture
DestroyMenu
LoadCursorA
GetSysColorBrush
GetWindowThreadProcessId
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
InvalidateRgn
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
SetRect
IsRectEmpty
SetTimer
GetMenuState
KillTimer
IsWindowVisible
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowPos
OffsetRect
SendMessageA
InvalidateRect
EnableWindow
ExitWindowsEx
LoadIconA
GetWindowLongA
SetWindowLongA
SetLayeredWindowAttributes
RedrawWindow
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
PostMessageA
CharUpperA
GetWindowRect
GetDC
EndDialog
GetNextDlgTabItem
GetParent
IsWindowEnabled
GetDlgItem
IsWindow
DestroyWindow
CreateDialogIndirectParamA
SetActiveWindow
GetActiveWindow
GetDesktopWindow
CopyRect
ReleaseDC
GetWindow
IntersectRect
SystemParametersInfoA
GetWindowPlacement
gdi32
SaveDC
GetDeviceCaps
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
CreateBitmap
GetStockObject
DeleteDC
ExtSelectClipRgn
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateRectRgnIndirect
CreateFontA
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
SetBkMode
RestoreDC
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegOpenKeyA
RegQueryValueExA
comctl32
InitCommonControlsEx
shlwapi
PathIsUNCA
PathStripToRootA
PathFindFileNameA
PathFindExtensionA
PathFileExistsA
oledlg
ord8
ole32
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CoTaskMemFree
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysAllocString
OleCreateFontIndirect
SysStringLen
SysFreeString
SysAllocStringByteLen
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
winmm
PlaySoundA
Sections
.text Size: 264KB - Virtual size: 260KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 460KB - Virtual size: 456KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ