Static task
static1
Behavioral task
behavioral1
Sample
3e0233b248235155229a35aaf7a84ccae5cd82927c141b99bb8e1199ed7cb01b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3e0233b248235155229a35aaf7a84ccae5cd82927c141b99bb8e1199ed7cb01b.exe
Resource
win10v2004-20220812-en
General
-
Target
3e0233b248235155229a35aaf7a84ccae5cd82927c141b99bb8e1199ed7cb01b
-
Size
281KB
-
MD5
26b35e8964f004c695be1db1333f4b4b
-
SHA1
0edfa34189f78e1eea03314b79f41f9ac2a78d0d
-
SHA256
3e0233b248235155229a35aaf7a84ccae5cd82927c141b99bb8e1199ed7cb01b
-
SHA512
34c2edc509c8a54f4cf4a40f40bc5c535d9e57e20dd07922517ac76a2b56500c1e5770eb4fa5c1fea4cac56a154c3f19287b7468dcf5822fce90918d940df204
-
SSDEEP
6144:yfsScCXFuRiOD0irCeY10m7Tu9hxPGGaxxv9VXhcpQK:yfsfCVuRTP8mPGG0h9Ji
Malware Config
Signatures
Files
-
3e0233b248235155229a35aaf7a84ccae5cd82927c141b99bb8e1199ed7cb01b.exe windows x86
1237a8335d9e053f5a0ee839d7e2d5d0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetShortPathNameW
GetStartupInfoA
GetSystemDefaultLangID
GetSystemDirectoryA
GetSystemDirectoryW
GetSystemTimeAsFileTime
GetTempPathA
GetTempPathW
GetTickCount
GetTimeZoneInformation
GetUserDefaultLangID
GetVersion
GetVersionExA
GetVersionExW
GetWindowsDirectoryA
GetWindowsDirectoryW
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsBadReadPtr
IsBadWritePtr
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadLibraryExW
LoadLibraryW
MapViewOfFile
MoveFileA
MoveFileExA
MoveFileExW
MoveFileW
GetShortPathNameA
OpenEventA
OpenEventW
QueryDosDeviceA
QueryDosDeviceW
QueryPerformanceCounter
ReadFile
ReleaseMutex
RemoveDirectoryA
RemoveDirectoryW
ResetEvent
SetCurrentDirectoryA
SetCurrentDirectoryW
SetEndOfFile
SetErrorMode
SetEvent
SetFileAttributesA
SetFileAttributesW
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringA
WritePrivateProfileStringW
WriteProfileStringA
WriteProfileStringW
lstrcpynW
lstrlenA
lstrlenW
GetProfileStringW
GetProfileStringA
GetProcessHeap
GetProcAddress
GetPrivateProfileStringW
GetPrivateProfileStringA
VirtualAlloc
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetModuleFileNameA
GetLocaleInfoW
GetLocaleInfoA
GetLastError
GetFileTime
GetFileSize
GetFileAttributesW
GetFileAttributesA
GetExitCodeThread
GetExitCodeProcess
GetDriveTypeW
GetDriveTypeA
GetDiskFreeSpaceA
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetCurrentDirectoryW
GetCurrentDirectoryA
FreeLibrary
FindNextFileW
FindNextFileA
FindFirstFileW
FindFirstFileA
FindClose
FileTimeToSystemTime
ExpandEnvironmentStringsW
ExpandEnvironmentStringsA
EnterCriticalSection
DeviceIoControl
DeleteFileW
DeleteFileA
DeleteCriticalSection
CreateThread
CreateProcessW
CreateProcessA
CreateMutexW
CreateMutexA
CreateFileW
CreateFileMappingW
CreateFileMappingA
CreateFileA
CreateEventW
CreateEventA
CreateDirectoryW
CreateDirectoryA
CopyFileW
CopyFileA
CompareStringW
CompareStringA
CloseHandle
GetCommandLineW
MultiByteToWideChar
user32
PostThreadMessageA
PostThreadMessageW
RegisterClassA
RegisterClassW
RegisterWindowMessageA
ReleaseDC
ScreenToClient
ScrollWindow
SendDlgItemMessageW
SendMessageA
SendMessageW
SetCursor
SetFocus
SetScrollInfo
SetWindowLongA
SetWindowLongW
SetWindowPos
SetWindowTextA
SetWindowTextW
ShowWindow
TranslateMessage
UnregisterClassA
UnregisterClassW
UpdateWindow
PostQuitMessage
PostMessageW
PostMessageA
PeekMessageW
PeekMessageA
MsgWaitForMultipleObjects
MoveWindow
MessageBoxW
MessageBoxA
MapWindowPoints
LoadStringW
LoadStringA
LoadImageW
LoadImageA
LoadIconW
LoadCursorW
IsWindow
IsDialogMessageW
IsDialogMessageA
InvalidateRect
GetWindowTextW
GetWindowTextA
GetWindowRect
GetWindowLongW
GetWindowLongA
GetSystemMetrics
GetScrollInfo
GetParent
GetMessageW
GetMessageA
GetDlgItem
GetDesktopWindow
GetDC
GetClientRect
GetClassNameA
GetClassLongA
GetActiveWindow
FindWindowW
FindWindowExW
FindWindowExA
FindWindowA
EndPaint
EnableWindow
DrawTextW
DrawTextA
DrawFocusRect
DispatchMessageW
DispatchMessageA
DestroyWindow
DestroyCursor
DefWindowProcW
DefWindowProcA
CreateWindowExW
CreateWindowExA
CreateDialogParamW
CharNextA
CallWindowProcW
CallWindowProcA
BeginPaint
LoadIconA
LoadCursorA
CreateDialogParamA
gdi32
SetTextColor
SetMapMode
SetBkMode
SetBkColor
SelectObject
PatBlt
GetTextMetricsW
GetTextMetricsA
GetTextFaceA
GetObjectW
GetObjectType
GetObjectA
GetDeviceCaps
ExtTextOutW
DeleteObject
DeleteDC
CreateSolidBrush
CreatePen
CreateFontIndirectW
CreateFontIndirectA
CreateFontA
CreateCompatibleDC
GetStockObject
advapi32
EnumDependentServicesW
StartServiceW
RegSetValueExW
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegQueryInfoKeyW
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumValueW
RegEnumValueA
RegEnumKeyExW
RegEnumKeyExA
RegDeleteValueW
RegDeleteValueA
RegDeleteKeyW
RegDeleteKeyA
RegCreateKeyExW
RegCreateKeyExA
QueryServiceStatus
OpenServiceW
OpenSCManagerW
OpenProcessToken
RegCloseKey
RegOpenKeyExW
AdjustTokenPrivileges
AllocateAndInitializeSid
CloseServiceHandle
ControlService
LookupPrivilegeValueA
EqualSid
FreeSid
GetTokenInformation
InitiateSystemShutdownExW
LookupPrivilegeValueW
ole32
CoInitialize
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoUninitialize
CoCreateInstance
comctl32
InitCommonControlsEx
msvcrt
_wcslwr
wcstok
wcsstr
wcsrchr
wcspbrk
wcsncpy
wcsncmp
_XcptFilter
__dllonexit
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_beginthreadex
_c_exit
_cexit
_controlfp
_endthread
_except_handler3
_exit
_ftol
_initterm
_itow
_onexit
_purecall
_snwprintf
_stricmp
_strlwr
_vsnprintf
_vsnwprintf
_wcsicmp
_wcsnicmp
_wcsupr
_wtoi
_wtol
calloc
ceil
exit
free
iswalnum
iswalpha
iswdigit
iswspace
malloc
memmove
strchr
strncat
strncpy
strpbrk
strrchr
strstr
swscanf
time
towupper
wcschr
wcscmp
wcslen
wcsncat
Sections
.text Size: 266KB - Virtual size: 266KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ