Static task
static1
Behavioral task
behavioral1
Sample
3684ad02501a52844badeb77354983c714c6bd1cd26cc7b12f2162e29d93bac6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3684ad02501a52844badeb77354983c714c6bd1cd26cc7b12f2162e29d93bac6.exe
Resource
win10v2004-20220901-en
General
-
Target
3684ad02501a52844badeb77354983c714c6bd1cd26cc7b12f2162e29d93bac6
-
Size
224KB
-
MD5
57fe12870eed9df3595df3665192de50
-
SHA1
4d9366e1e5bede9c27db8094a90cf11d42e0c334
-
SHA256
3684ad02501a52844badeb77354983c714c6bd1cd26cc7b12f2162e29d93bac6
-
SHA512
cb7c4ec30b3e723356aa0adc869b55a7d7b6fba4d287ae18ef1c4450bd165b389f9eaa869c466a8f6a8faef208bd3442669ea8b6b83075d6bb0bb77ee6defde5
-
SSDEEP
6144:YtL0RZovZmHl9jzMZwVORdmeTzUzo0naGU:YqvovsF9jmzjUPaGU
Malware Config
Signatures
Files
-
3684ad02501a52844badeb77354983c714c6bd1cd26cc7b12f2162e29d93bac6.exe windows x86
5cc93023631c840c68be31182d10abf1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
lstrcatA
GetModuleHandleA
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetCPInfo
GetOEMCP
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
GetCommandLineA
ExitProcess
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
TerminateProcess
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetUnhandledExceptionFilter
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetTimeZoneInformation
LCMapStringA
LCMapStringW
IsBadReadPtr
IsBadCodePtr
GetLocaleInfoW
SetEnvironmentVariableA
GlobalFlags
GetFileTime
GetFileAttributesA
GetProcAddress
CreateFileA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
WaitForSingleObject
lstrcpyA
FindFirstFileA
FindClose
lstrcmpA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
InterlockedIncrement
InterlockedDecrement
RaiseException
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LoadLibraryA
LocalAlloc
FreeLibrary
FileTimeToLocalFileTime
FileTimeToSystemTime
SetLastError
GlobalFree
FindResourceA
LoadResource
LockResource
SizeofResource
GlobalAlloc
GlobalLock
GlobalUnlock
lstrcpynA
GetPrivateProfileStringA
GetPrivateProfileIntA
CreatePipe
GetStartupInfoA
CreateProcessA
CloseHandle
PeekNamedPipe
ReadFile
Sleep
GetModuleFileNameA
GetDriveTypeA
GetDiskFreeSpaceExA
GetEnvironmentVariableA
CompareStringW
CompareStringA
GlobalMemoryStatus
FormatMessageA
LocalFree
lstrlenA
lstrcmpiA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
user32
DestroyMenu
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
LoadIconA
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageA
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
PostQuitMessage
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
CopyRect
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowPos
SetWindowLongA
CharUpperA
wsprintfA
GetSubMenu
GetMenuItemCount
GetDlgItem
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
GetMenuItemID
GetMenuState
UnregisterClassA
GetSysColorBrush
GetSysColor
ReleaseDC
GetDC
GetSystemMetrics
LoadCursorA
UnhookWindowsHookEx
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetParent
MessageBoxA
SendMessageA
GetWindowTextA
GetClassNameA
SetWindowTextA
GetFocus
PtInRect
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
ValidateRect
gdi32
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
GetDeviceCaps
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
DeleteObject
SelectObject
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueExA
RegEnumKeyExA
RegCloseKey
RegOpenKeyExA
comctl32
ord17
shlwapi
PathIsUNCA
PathStripToRootA
PathFindFileNameA
UrlUnescapeA
wininet
InternetOpenUrlA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetQueryDataAvailable
HttpQueryInfoA
InternetCloseHandle
InternetGetLastResponseInfoA
InternetOpenA
InternetSetStatusCallback
InternetReadFile
InternetWriteFile
InternetSetFilePointer
netapi32
NetWkstaTransportEnum
NetApiBufferFree
ws2_32
inet_ntoa
WSAStartup
gethostname
WSACleanup
gethostbyname
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 140KB - Virtual size: 139KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE