Static task
static1
Behavioral task
behavioral1
Sample
3378fcffc9d77f94b1cb1eb4bb6b53dc036312a27a673d5954e2ba1050288c27.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3378fcffc9d77f94b1cb1eb4bb6b53dc036312a27a673d5954e2ba1050288c27.exe
Resource
win10v2004-20220812-en
General
-
Target
3378fcffc9d77f94b1cb1eb4bb6b53dc036312a27a673d5954e2ba1050288c27
-
Size
212KB
-
MD5
12731408e37a2cb0304d93834f705b50
-
SHA1
dd20d993596f9c2fa7c7a3f5b696b56e12f27149
-
SHA256
3378fcffc9d77f94b1cb1eb4bb6b53dc036312a27a673d5954e2ba1050288c27
-
SHA512
d7231ac502ae51f88bb13285249b5559404e13ce49268cac6f83145e590b1071fbf53217ce69b0e6bb59cd7bb0d4b75d73c039e806c0e05035e85f2b2b87cc47
-
SSDEEP
3072:FSo1t6sVZgQQ3T8HUkEt0+bvNIRxki7y2Gm4zL4njjlnQ7wLt3bf:FjUkZgJDLztlbHi7y2eIVnrbf
Malware Config
Signatures
Files
-
3378fcffc9d77f94b1cb1eb4bb6b53dc036312a27a673d5954e2ba1050288c27.exe windows x86
fb7426b66ae24f053b9af0d38965fafb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindClose
FindFirstFileA
GetVolumeInformationA
GetFullPathNameA
lstrcmpiA
GetFileAttributesA
GetFileSize
GetFileTime
lstrcatA
TlsAlloc
GlobalUnlock
GlobalHandle
GlobalLock
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GetVersion
lstrcmpA
GetCurrentThreadId
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
GlobalFlags
GetCPInfo
GetOEMCP
ExitProcess
RtlUnwind
UnlockFile
GetSystemTime
GetCommandLineA
RaiseException
SetStdHandle
GetACP
HeapSize
HeapReAlloc
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetStartupInfoA
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
InterlockedExchange
LockFile
FlushFileBuffers
lstrlenA
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
ReleaseMutex
OpenFileMappingA
GetEnvironmentVariableA
GetShortPathNameA
SetPriorityClass
ResumeThread
LocalAlloc
CreateMutexA
FreeLibrary
LoadLibraryA
GetProcAddress
OutputDebugStringA
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcpynA
FormatMessageA
LocalFree
SetLastError
SetFileAttributesA
WriteFile
LocalFileTimeToFileTime
SetFileTime
CreateDirectoryA
DosDateTimeToFileTime
SystemTimeToFileTime
ReadFile
DuplicateHandle
GetFileType
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetPrivateProfileStringA
UnmapViewOfFile
SetFilePointer
SetEndOfFile
CreateFileA
CreateFileMappingA
MapViewOfFile
SetEvent
GetCurrentProcess
WideCharToMultiByte
TerminateProcess
CreateProcessA
GetLastError
CreateEventA
PostQueuedCompletionStatus
InterlockedExchangeAdd
GetQueuedCompletionStatus
HeapAlloc
TerminateThread
GetProcessHeap
HeapFree
CreateIoCompletionPort
CreateToolhelp32Snapshot
Process32First
Process32Next
GetModuleHandleA
GlobalAlloc
GlobalFree
GetDriveTypeA
GetSystemInfo
GetVersionExA
lstrcpyA
GetCurrentProcessId
GetLocalTime
GetModuleFileNameA
GetCurrentDirectoryA
GetTickCount
DeleteFileA
OpenProcess
WaitForSingleObject
CreateThread
CloseHandle
GetTimeZoneInformation
Sleep
user32
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
LoadIconA
PostMessageA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
GetClientRect
CopyRect
SetWindowTextA
GetTopWindow
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
DispatchMessageA
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
SendMessageA
MessageBoxA
EnableWindow
UnhookWindowsHookEx
LoadStringA
GetSystemMetrics
CharUpperA
GetCapture
gdi32
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
FreeSid
InitializeSecurityDescriptor
GetLengthSid
SetSecurityDescriptorDacl
AllocateAndInitializeSid
InitializeAcl
AddAccessAllowedAce
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
shell32
SHFileOperationA
ord51
comctl32
ord17
ws2_32
gethostbyaddr
recv
send
accept
ioctlsocket
connect
select
socket
WSAEventSelect
WSAIoctl
htons
bind
listen
closesocket
recvfrom
getpeername
ntohs
WSARecv
WSASocketA
setsockopt
WSAGetLastError
inet_addr
gethostbyname
WSAAddressToStringA
gethostname
WSACleanup
WSAStartup
htonl
inet_ntoa
ntohl
__WSAFDIsSet
sendto
WSASend
wininet
InternetGetLastResponseInfoA
HttpQueryInfoA
InternetQueryDataAvailable
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetSetOptionExA
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
InternetQueryOptionA
InternetCanonicalizeUrlA
InternetCrackUrlA
iphlpapi
GetIpAddrTable
GetBestInterface
Sections
.text Size: 148KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
LPPlatfo Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE