Static task
static1
Behavioral task
behavioral1
Sample
3266f616f4834cb0587e268c1af18d09999b17a1eb8648b317e0b087e328a6f0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3266f616f4834cb0587e268c1af18d09999b17a1eb8648b317e0b087e328a6f0.exe
Resource
win10v2004-20220901-en
General
-
Target
3266f616f4834cb0587e268c1af18d09999b17a1eb8648b317e0b087e328a6f0
-
Size
204KB
-
MD5
6cc99f8ad1d343760608b0cd55fd6d3a
-
SHA1
12d998cdb1fc99bff52b0d4303442064af6789dd
-
SHA256
3266f616f4834cb0587e268c1af18d09999b17a1eb8648b317e0b087e328a6f0
-
SHA512
b0c35025df762045d1f0dee578ff3440292b99817cd10a282ce92b099aa5afc320d67272e3a6b06027e2a82d8d25c4b4c3ce86974a6c2d7f7a988e87ad7ba909
-
SSDEEP
6144:GXyrsapDI7gEk56TO1fEFBhqNP1PdUvo1zwg5:2ygapDI7gp5aO1fuYNP1PdUQ1Ea
Malware Config
Signatures
Files
-
3266f616f4834cb0587e268c1af18d09999b17a1eb8648b317e0b087e328a6f0.exe windows x86
0c34927403aa4e0c53a741a71f40bbf9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ReleaseDC
CheckDlgButton
IsWindowVisible
SetCursor
DefWindowProcW
GetDC
SetWindowLongW
SetDlgItemInt
LoadStringW
GetWindowLongW
CheckRadioButton
CreateDialogParamW
GetAsyncKeyState
EnableWindow
DispatchMessageW
InvalidateRect
LoadCursorW
GetWindowRect
IsRectEmpty
GetDlgItemInt
ClientToScreen
GetDesktopWindow
SendMessageW
SetDlgItemTextW
GetDlgItem
MoveWindow
DestroyWindow
ShowWindow
TranslateMessage
IsWindow
PeekMessageW
GetClientRect
kernel32
GetQueuedCompletionStatus
CreateThread
LoadLibraryW
WaitForMultipleObjects
GetProfileIntA
DeleteFileW
HeapFree
SetFilePointer
GetProcessHeap
CreateSemaphoreW
QueryPerformanceCounter
VirtualFree
CloseHandle
GetCurrentThread
lstrcpyW
lstrlenW
GetSystemDefaultLangID
WideCharToMultiByte
GetPrivateProfileStringW
GetFullPathNameW
lstrcmpW
WriteFile
GlobalMemoryStatus
lstrcmpiW
ReadFile
GetCurrentProcess
LeaveCriticalSection
GlobalHandle
IsBadReadPtr
ReleaseSemaphore
GetACP
FreeLibrary
GlobalFree
lstrcpynW
HeapAlloc
InterlockedIncrement
GlobalUnlock
InterlockedExchange
GetCurrentProcessId
GlobalLock
GetDiskFreeSpaceW
SetEndOfFile
SetEvent
GetThreadPriority
GetSystemTimeAsFileTime
CreateEventW
InitializeCriticalSection
GetTickCount
DeleteCriticalSection
GlobalAlloc
SetThreadPriority
GetProcAddress
SetUnhandledExceptionFilter
GetVersionExW
MultiByteToWideChar
GetFileSize
IsBadWritePtr
lstrcpyA
GetSystemInfo
CreateFileW
MulDiv
IsBadCodePtr
EnterCriticalSection
ResetEvent
GetModuleFileNameA
GetTimeZoneInformation
GetLastError
GetFileAttributesW
InterlockedDecrement
lstrlenA
WaitForSingleObject
cfgmgr32
CMP_Init_Detection
CMP_WaitServicesAvailable
CMP_Report_LogOn
CM_Add_Empty_Log_Conf
CMP_WaitNoPendingInstallEvents
ifsutil
?AddEntry@AUTOREG@@SGEPBVWSTRING@@@Z
?AddNext@NUMBER_SET@@QAEEVBIG_INT@@@Z
?AddEdge@DIGRAPH@@QAEEKK@Z
?AddStart@NUMBER_SET@@QAEEVBIG_INT@@@Z
?CheckAndAdd@NUMBER_SET@@QAEEVBIG_INT@@PAE@Z
?CheckAndRemove@NUMBER_SET@@QAEEVBIG_INT@@PAE@Z
?CheckAndAdd@SPARSE_SET@@QAEEVBIG_INT@@PAE@Z
?AddVolumeName@MOUNT_POINT_MAP@@QAEEPAVWSTRING@@0@Z
nddeapi
NDdeGetTrustedShareA
NDdeGetTrustedShareW
NDdeGetShareSecurityA
NDdeGetShareSecurityW
NDdeGetErrorStringA
NDdeIsValidAppTopicListW
NDdeIsValidAppTopicListA
cewmdm
DllGetClassObject
DllUnregisterServer
DllCanUnloadNow
DllRegisterServer
Sections
.text Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 62KB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 836B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ