Static task
static1
Behavioral task
behavioral1
Sample
3fe44ce191baa61e0726fe3eb8143db7fe9f7e61c8e8bc1b9094695e9fab5206.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3fe44ce191baa61e0726fe3eb8143db7fe9f7e61c8e8bc1b9094695e9fab5206.exe
Resource
win10v2004-20220812-en
General
-
Target
3fe44ce191baa61e0726fe3eb8143db7fe9f7e61c8e8bc1b9094695e9fab5206
-
Size
329KB
-
MD5
6933020d1a0943e1d8c2d6b44ca1067a
-
SHA1
1f14e40ac099050dc026983cd5a445bc8b77eec8
-
SHA256
3fe44ce191baa61e0726fe3eb8143db7fe9f7e61c8e8bc1b9094695e9fab5206
-
SHA512
d825641639bf006889e71bf5b5451d3bb416b51627f7d93b503030f67c50ca26d3038e8b4f921a08f30780f27e76c6ddb384c9a7319a1c026e49edbaf30f8867
-
SSDEEP
6144:9/yFlvPosFfDWRWPc8yumfZwzLyIlQMm3aFVg7d7:gF5gsBfc8yumfuzL7QMm3aFVM
Malware Config
Signatures
Files
-
3fe44ce191baa61e0726fe3eb8143db7fe9f7e61c8e8bc1b9094695e9fab5206.exe windows x86
42187a2ec880a2c7b508da7afa30fb38
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowRgn
SetWindowTextW
SetWindowsHookExW
ShowWindow
SystemParametersInfoW
TrackPopupMenu
TrackPopupMenuEx
SetWindowPos
TranslateMessage
UnhookWindowsHookEx
UnregisterClassA
UpdateLayeredWindow
UpdateWindow
WindowFromPoint
SetWindowPlacement
SetWindowLongW
SetTimer
SetScrollPos
SetScrollInfo
SetRectEmpty
SetRect
SetPropW
SetParent
SetMenuItemInfoW
SetMenuDefaultItem
SetMenu
SetLayeredWindowAttributes
SetForegroundWindow
SetFocus
SetDlgItemTextW
SetCursor
SetDlgItemInt
SetClipboardViewer
SetClipboardData
SetCapture
SetActiveWindow
SendMessageW
ScreenToClient
RemovePropW
RemoveMenu
ReleaseDC
ReleaseCapture
RegisterWindowMessageW
RegisterClipboardFormatW
RegisterClassExW
RedrawWindow
PtInRect
PostQuitMessage
PostMessageW
PeekMessageW
PeekMessageA
OpenClipboard
OffsetRect
MsgWaitForMultipleObjectsEx
MsgWaitForMultipleObjects
MoveWindow
MonitorFromWindow
MonitorFromRect
MonitorFromPoint
ModifyMenuW
MessageBoxW
MessageBeep
LoadStringW
LoadStringA
LoadMenuW
LoadImageW
LoadIconW
LoadCursorW
LoadBitmapW
LoadAcceleratorsW
KillTimer
IsZoomed
IsWindowVisible
IsWindowEnabled
IsWindow
IsRectEmpty
IsMenu
IsIconic
IsChild
InvalidateRgn
InvalidateRect
IntersectRect
InsertMenuItemW
InflateRect
GetWindowThreadProcessId
GetWindowTextW
GetWindowTextLengthW
GetWindowRect
GetWindowPlacement
GetWindowLongW
GetWindowDC
GetWindow
GetUpdateRect
GetTopWindow
GetSystemMetrics
GetSysColorBrush
GetSysColor
GetSubMenu
GetScrollRange
GetScrollPos
GetScrollInfo
GetPropW
GetParent
GetMonitorInfoW
GetMessageW
GetMessagePos
GetMenuItemInfoW
GetMenuItemID
GetMenuItemCount
GetMenu
GetKeyState
GetForegroundWindow
GetFocus
GetDoubleClickTime
GetDlgItemTextW
GetDlgItemInt
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
GetDC
GetCursorPos
GetClipboardData
GetClientRect
GetClassNameW
GetClassLongW
GetClassInfoW
GetClassInfoExW
GetCapture
GetAsyncKeyState
GetActiveWindow
FrameRect
FindWindowW
FillRect
ExitWindowsEx
EqualRect
EnumWindows
EnumChildWindows
EndPaint
EndDialog
EndDeferWindowPos
EnableWindow
EnableMenuItem
EmptyClipboard
DrawTextW
DrawStateW
DrawIconEx
DrawFocusRect
DrawEdge
DispatchMessageW
DispatchMessageA
DialogBoxParamW
DestroyWindow
DestroyMenu
DestroyIcon
DestroyCursor
DestroyAcceleratorTable
DeferWindowPos
DefWindowProcW
CreateWindowExW
CreatePopupMenu
CreateDialogParamW
CreateAcceleratorTableW
CopyRect
CopyAcceleratorTableW
CloseClipboard
ClientToScreen
CheckMenuItem
CheckDlgButton
CharUpperW
CharNextW
CharLowerW
ChangeClipboardChain
CallWindowProcW
CallNextHookEx
BringWindowToTop
BeginPaint
BeginDeferWindowPos
AppendMenuW
TranslateAcceleratorW
AllowSetForegroundWindow
shell32
ShellExecuteExA
ShellExecuteA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
SHGetFileInfoA
SHGetDesktopFolder
SHFileOperationA
SHChangeNotify
SHBrowseForFolderA
FindExecutableA
ExtractIconExA
DragQueryFileW
DragQueryFileA
DragFinish
DragAcceptFiles
Shell_NotifyIconA
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontA
CreatePatternBrush
CreatePen
CreateSolidBrush
DPtoLP
DeleteDC
DeleteObject
ExtTextOutA
GetDeviceCaps
GetMapMode
GetObjectA
GetPixel
GetTextExtentPoint32A
GetTextFaceA
GetTextMetricsA
LineTo
MoveToEx
Polygon
Polyline
Rectangle
SelectObject
SetBkColor
SetMapMode
SetPixel
SetTextColor
StretchBlt
TextOutA
CreateBitmap
kernel32
OpenEventA
MultiByteToWideChar
MulDiv
Module32FirstW
MapViewOfFile
LockResource
LocalReAlloc
LocalFree
LocalAlloc
LoadResource
LoadLibraryW
LoadLibraryExW
LoadLibraryA
LeaveCriticalSection
IsDebuggerPresent
IsDBCSLeadByte
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
InterlockedCompareExchange
InitializeCriticalSection
HeapFree
HeapDestroy
HeapAlloc
GlobalFree
GlobalAlloc
GetVersionExW
GetVersionExA
GetUserDefaultLCID
GetTimeFormatA
GetTickCount
GetTempPathA
GetTempFileNameA
GetSystemTimeAsFileTime
GetSystemTime
GetSystemInfo
GetSystemDirectoryW
GetSystemDirectoryA
GetSystemDefaultLCID
GetStringTypeExA
GetStartupInfoA
QueryPerformanceFrequency
GetProcessHeap
GetProcAddress
GetPriorityClass
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetModuleFileNameA
GetLocalTime
GetLastError
GetFileAttributesW
GetFileAttributesA
GetDateFormatA
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetComputerNameA
GetCommandLineW
GetAtomNameW
FreeResource
FreeLibrary
FormatMessageW
FlushInstructionCache
FindResourceA
FindNextFileA
FindFirstFileA
FindClose
FileTimeToSystemTime
EnterCriticalSection
DeleteCriticalSection
DebugBreak
CreateThread
CreateMutexW
CreateMutexA
CreateFileMappingW
CreateFileA
CreateEventW
CreateEventA
CreateDirectoryA
CompareFileTime
CloseHandle
BindIoCompletionCallback
RaiseException
ReadFile
ReadFileEx
ReleaseMutex
ResetEvent
ResumeThread
RtlUnwind
RtlZeroMemory
SetEndOfFile
SetErrorMode
SetEvent
SetFilePointer
SetLastError
SetPriorityClass
SetUnhandledExceptionFilter
SizeofResource
Sleep
SystemTimeToFileTime
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
WaitForMultipleObjectsEx
GetProcessPriorityBoost
WaitForSingleObject
comdlg32
CommDlgExtendedError
GetOpenFileNameA
GetOpenFileNameW
ChooseFontA
Sections
.text Size: 238KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ