Static task
static1
Behavioral task
behavioral1
Sample
a3b38d9f5d176e60481f8377db3fc903faa56cdaaeda11ec356e488dcb083c53.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a3b38d9f5d176e60481f8377db3fc903faa56cdaaeda11ec356e488dcb083c53.exe
Resource
win10v2004-20220812-en
General
-
Target
a3b38d9f5d176e60481f8377db3fc903faa56cdaaeda11ec356e488dcb083c53
-
Size
708KB
-
MD5
7caaa2f85c12f42119a97512f47b1ba3
-
SHA1
692b1352bef7188f73f79c1191ecfc1258d2fd8b
-
SHA256
a3b38d9f5d176e60481f8377db3fc903faa56cdaaeda11ec356e488dcb083c53
-
SHA512
fa68e5323bf701f2d3bd9343085cfafb19ff8e81b3e5a0a020d98849877ebb48bb6871e5532b86e09872077f2000376988438d366d6f3290be3348f5e98a6814
-
SSDEEP
12288:unCLGYIjxprLVLpvroJp2yUY8KePmrZxAOn2lt+X6A6TJ5NPNCXwA/60qJ0QnQ4C:SjxprRLJrO2yIKePmrZxAOn2lt+X6A6o
Malware Config
Signatures
Files
-
a3b38d9f5d176e60481f8377db3fc903faa56cdaaeda11ec356e488dcb083c53.exe windows x86
9d0635755c7f36b4a516062496783b93
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetErrorMode
ExitProcess
RtlUnwind
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
ExitThread
CreateThread
TerminateProcess
HeapReAlloc
HeapSize
SetStdHandle
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapDestroy
HeapCreate
GetOEMCP
IsBadWritePtr
SetUnhandledExceptionFilter
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetDriveTypeA
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
GetCPInfo
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
InterlockedIncrement
LocalAlloc
FindNextFileA
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetFileSize
FileTimeToSystemTime
InterlockedDecrement
WritePrivateProfileStringA
ReleaseMutex
CreateMutexA
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
SetLastError
FreeResource
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
lstrcpynA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalLock
GlobalFree
GlobalUnlock
WriteFile
lstrcpyA
DosDateTimeToFileTime
GetFileAttributesA
GetFullPathNameA
WaitForSingleObject
OutputDebugStringA
SetEvent
CreateEventA
CreateDirectoryA
GetVolumeInformationA
RemoveDirectoryA
FormatMessageA
LocalFree
SetFileTime
CreateFileA
GetFileTime
CloseHandle
FindFirstFileA
FindClose
CompareFileTime
LocalFileTimeToFileTime
Sleep
MoveFileExA
FileTimeToLocalFileTime
CopyFileA
MoveFileA
GetModuleFileNameA
GetCurrentDirectoryA
GetDiskFreeSpaceExA
GetTickCount
DeleteFileA
MulDiv
EnterCriticalSection
LeaveCriticalSection
FindResourceA
LoadResource
LockResource
SizeofResource
CompareStringW
CompareStringA
lstrlenA
lstrlenW
lstrcmpiA
GetVersion
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
VirtualFree
InterlockedExchange
user32
InflateRect
GetSysColorBrush
SetWindowContextHelpId
MapDialogRect
CharNextA
InvalidateRgn
CopyAcceleratorTableA
WindowFromPoint
LoadMenuA
DestroyMenu
UnpackDDElParam
ReuseDDElParam
LoadAcceleratorsA
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
SetMenu
TranslateAcceleratorA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
wsprintfA
GetDesktopWindow
CreateDialogIndirectParamA
GetNextDlgTabItem
EndDialog
GetMessageA
TranslateMessage
GetActiveWindow
ValidateRect
ShowOwnedPopups
PostQuitMessage
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
IsWindowEnabled
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageA
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
ScrollWindow
MessageBoxA
TrackPopupMenu
GetKeyState
SetScrollRange
GetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
IsWindowVisible
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
ScreenToClient
EqualRect
DeferWindowPos
GetScrollInfo
SetScrollInfo
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
IntersectRect
GetWindowPlacement
GetWindow
SetFocus
GetDlgCtrlID
GetFocus
IsChild
GetCursorPos
ReleaseCapture
PostThreadMessageA
MessageBeep
GetNextDlgGroupItem
RegisterClipboardFormatA
PtInRect
GetParent
SetCapture
UpdateWindow
ClientToScreen
GetWindowRect
SetWindowRgn
OffsetRect
IsRectEmpty
RegisterWindowMessageA
FindWindowA
SystemParametersInfoA
CallNextHookEx
GetMenuItemInfoA
IsWindow
AdjustWindowRectEx
GetSysColor
LoadCursorA
SetCursor
TrackMouseEvent
CopyRect
KillTimer
GetSystemMetrics
LoadImageA
LoadIconA
SetTimer
InvalidateRect
GetClientRect
IsIconic
PostMessageA
SendMessageA
DrawIcon
FillRect
LoadBitmapA
SetRect
UnregisterClassA
CharUpperA
EnableWindow
GetClassNameA
gdi32
CreateRectRgnIndirect
GetRgnBox
GetBkColor
GetTextColor
GetTextExtentPoint32A
GetMapMode
GetViewportExtEx
SetMapMode
GetStockObject
CreatePatternBrush
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetPixel
CreateSolidBrush
SetBkMode
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
Ellipse
LPtoDP
CreateEllipticRgn
GetDeviceCaps
CreateFontIndirectA
StretchBlt
DeleteObject
GetDIBColorTable
SelectObject
DeleteDC
BitBlt
CreateCompatibleDC
GetObjectA
CreateCompatibleBitmap
GetWindowExtEx
msimg32
AlphaBlend
TransparentBlt
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCloseKey
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
shell32
ShellExecuteExA
DragFinish
DragQueryFileA
ShellExecuteA
comctl32
ord17
ImageList_Draw
ImageList_GetImageInfo
ImageList_Destroy
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
UrlUnescapeA
ole32
CoGetClassObject
OleUninitialize
CoTaskMemFree
OleInitialize
CoTaskMemAlloc
CoRevokeClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CLSIDFromString
CLSIDFromProgID
CoFreeUnusedLibraries
CoRegisterMessageFilter
OleFlushClipboard
OleIsCurrentClipboard
oleaut32
OleCreateFontIndirect
VariantCopy
SafeArrayCreate
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SysAllocString
SafeArrayDestroy
SystemTimeToVariantTime
SysAllocStringByteLen
SysStringLen
VariantChangeType
VariantClear
VariantInit
SysFreeString
SysAllocStringLen
gdiplus
GdiplusShutdown
ws2_32
send
WSAStartup
WSACleanup
closesocket
shutdown
WSACloseEvent
connect
htons
inet_addr
socket
WSACreateEvent
WSAEnumNetworkEvents
WSAEventSelect
recv
inet_ntoa
gethostbyname
oledlg
ord8
wininet
InternetReadFile
InternetQueryDataAvailable
InternetCanonicalizeUrlA
InternetCrackUrlA
HttpOpenRequestA
HttpQueryInfoA
InternetCloseHandle
InternetGetLastResponseInfoA
InternetConnectA
InternetOpenA
HttpSendRequestA
iphlpapi
GetAdaptersInfo
Sections
.text Size: 260KB - Virtual size: 259KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 300KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE