Static task
static1
Behavioral task
behavioral1
Sample
3f6e658e673bc73e15f6f581326d470ec48e98dc458aa0d764c33d0238cf04e6.exe
Resource
win7-20220901-en
General
-
Target
3f6e658e673bc73e15f6f581326d470ec48e98dc458aa0d764c33d0238cf04e6
-
Size
661KB
-
MD5
01733c506237e70ccb795e0a1a17f920
-
SHA1
53534bc5708c13b6a1448d4eb42aa6313dec49d7
-
SHA256
3f6e658e673bc73e15f6f581326d470ec48e98dc458aa0d764c33d0238cf04e6
-
SHA512
6611defc0ac42044cefea066b3eabfd6ab1bb4158523b2851b0b78edf1090ab9a23bdb22cbbfb613268547767ddb91bb2d17060a0d3f2966aaea7bfe13a665b2
-
SSDEEP
12288:zGRDU5ervjUo9BEgfYoIpqYSc53an9lpGN4FGtTRIMbF9MY3M:zGRmervjUoDEgfnIycJaBhYtTRTbPM0M
Malware Config
Signatures
Files
-
3f6e658e673bc73e15f6f581326d470ec48e98dc458aa0d764c33d0238cf04e6.exe windows x86
4b9b006bc496a2526b31c07ccf134c3b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteA
SHGetMalloc
SHGetSpecialFolderLocation
ShellExecuteExA
SHFileOperationA
comctl32
ord17
kernel32
WaitForSingleObject
CreateProcessA
lstrcpyA
GetWindowsDirectoryA
SetErrorMode
GetTempPathA
ExpandEnvironmentStringsA
LockResource
SizeofResource
LoadResource
FindResourceA
GetTickCount
GetExitCodeThread
CreateThread
CopyFileA
InterlockedIncrement
InterlockedDecrement
QueryPerformanceFrequency
CreateEventA
lstrcatA
GetTempFileNameA
CompareStringA
CompareStringW
GetVersionExA
LoadLibraryA
FreeLibrary
GetProcAddress
lstrcmpA
lstrcmpiA
GetSystemDefaultLCID
GlobalHandle
VerLanguageNameA
MoveFileA
SetCurrentDirectoryA
FindClose
FindNextFileA
CompareFileTime
FindFirstFileA
GetSystemTimeAsFileTime
SetFileAttributesA
LocalFree
FormatMessageA
GetSystemInfo
MulDiv
IsValidCodePage
GetVersion
GetModuleHandleA
GetFileAttributesA
IsBadReadPtr
VirtualQuery
FlushFileBuffers
SetEndOfFile
GetDiskFreeSpaceA
GetDriveTypeA
CreateDirectoryA
GetLastError
GetCurrentThread
GetLocaleInfoA
GetCurrentProcessId
FindResourceExA
LoadLibraryExA
GetDateFormatA
GetTimeFormatA
ExitProcess
GetProcessTimes
OpenProcess
SearchPathA
SetEnvironmentVariableA
GetLocaleInfoW
GetTimeZoneInformation
SetStdHandle
SetConsoleCtrlHandler
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
GetStringTypeA
IsBadCodePtr
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
FatalAppExitA
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
SetLastError
HeapSize
HeapReAlloc
GetCommandLineA
GetStartupInfoA
TerminateProcess
RaiseException
RtlUnwind
LeaveCriticalSection
DeleteCriticalSection
InterlockedExchange
InitializeCriticalSection
EnterCriticalSection
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
lstrlenA
CreateFileA
GetFileSize
GlobalAlloc
CloseHandle
GlobalLock
ReadFile
GlobalUnlock
GlobalFree
GetCurrentProcess
DuplicateHandle
GetThreadContext
VirtualProtectEx
WriteProcessMemory
FlushInstructionCache
SetThreadContext
ResumeThread
DeleteFileA
Sleep
RemoveDirectoryA
IsDBCSLeadByte
SetFilePointer
GetProcessHeap
HeapAlloc
HeapFree
WriteFile
lstrcpynA
GetModuleFileNameA
WideCharToMultiByte
lstrlenW
GetLocalTime
MultiByteToWideChar
VirtualProtect
ResetEvent
SetEvent
QueryPerformanceCounter
SystemTimeToFileTime
GetExitCodeProcess
LocalAlloc
user32
UpdateWindow
SetCursor
GetWindow
GetDlgItemTextA
SetFocus
GetClassInfoA
wvsprintfA
LoadStringA
EnableWindow
GetParent
GetWindowTextLengthA
GetWindowTextA
MoveWindow
SetWindowTextA
GetWindowPlacement
DrawIcon
DestroyIcon
GetDlgCtrlID
FillRect
GetSysColor
IsDialogMessageA
SendMessageA
GetWindowRect
GetSystemMetrics
SetRect
FindWindowA
IntersectRect
SubtractRect
IsWindow
CharPrevA
CharNextA
WaitForInputIdle
GetWindowLongA
BeginPaint
EndPaint
SetWindowLongA
GetClientRect
ClientToScreen
SetWindowPos
GetWindowDC
EndDialog
GetDlgItem
ShowWindow
GetDesktopWindow
wsprintfA
MsgWaitForMultipleObjects
PeekMessageA
MessageBoxA
CreateDialogIndirectParamA
CreateDialogParamA
DialogBoxIndirectParamA
DialogBoxParamA
DefWindowProcA
PostMessageA
KillTimer
PostQuitMessage
SetTimer
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
GetDC
ReleaseDC
CharUpperA
ExitWindowsEx
SendDlgItemMessageA
DestroyWindow
GetSysColorBrush
SetDlgItemTextA
gdi32
CreateFontA
GetTextExtentPoint32A
SetBkMode
SetTextColor
GetObjectA
CreateFontIndirectA
CreateSolidBrush
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
DeleteObject
GetStockObject
GetSystemPaletteEntries
CreatePalette
GetDeviceCaps
SelectPalette
RealizePalette
CreateDIBitmap
TranslateCharsetInfo
advapi32
RegCreateKeyA
RegOpenKeyA
OpenThreadToken
RegEnumValueA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegEnumKeyA
RegEnumKeyExA
RegDeleteKeyA
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
InitializeSecurityDescriptor
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
SetSecurityDescriptorDacl
ole32
CLSIDFromProgID
CoCreateInstance
StringFromCLSID
CoTaskMemFree
CoInitializeSecurity
CreateItemMoniker
GetRunningObjectTable
ProgIDFromCLSID
StringFromGUID2
CoUninitialize
CoInitialize
CoCreateGuid
oleaut32
SysAllocStringLen
SysReAllocStringLen
SysStringLen
SysAllocString
VariantClear
VariantChangeType
GetErrorInfo
CreateErrorInfo
RegisterTypeLi
LoadTypeLi
SetErrorInfo
SysFreeString
rpcrt4
UuidFromStringA
UuidCreate
UuidToStringA
RpcStringFreeA
Sections
.text Size: 416KB - Virtual size: 412KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 36KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE