Static task
static1
Behavioral task
behavioral1
Sample
3d74eff6b4341af205c3ca28ef5a40c69ed9a3dc4db81b80b3876ed44e7da2f7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3d74eff6b4341af205c3ca28ef5a40c69ed9a3dc4db81b80b3876ed44e7da2f7.exe
Resource
win10v2004-20220812-en
General
-
Target
3d74eff6b4341af205c3ca28ef5a40c69ed9a3dc4db81b80b3876ed44e7da2f7
-
Size
208KB
-
MD5
7bd5d54523a97930b8d6b81e2318d99b
-
SHA1
0b140ad78c6ee78458a955e673a5f48b9a97f3c6
-
SHA256
3d74eff6b4341af205c3ca28ef5a40c69ed9a3dc4db81b80b3876ed44e7da2f7
-
SHA512
e62a581c754129878885e65607454b1d0bf42f7d242fc111c942b8723d7cde947f9f0518b8f84adae09ad447788304ff784b416df50c0332a3bd27efdce0480b
-
SSDEEP
3072:pWPcaiqjKLVRU4vApmfxLJa/2OV2joWb5Ka/57LfM+6lgM8XOGCaM1aM7AOqQLbB:Ic1J+5cp2JX0xfMllWOjaM79qgVl
Malware Config
Signatures
Files
-
3d74eff6b4341af205c3ca28ef5a40c69ed9a3dc4db81b80b3876ed44e7da2f7.exe windows x86
68d959493a9bd9a247a09861394c8b0e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msoeacct
DllCanUnloadNow
HrCreateAccountManager
DllGetClassObject
GetDllMajorVersion
ValidEmailAddress
oleaut32
VarBstrFromCy
VarBstrFromUI1
VarBstrFromR4
VarBstrFromI1
VarBstrFromUI2
VarBstrFromDec
VarBstrFromI4
VarBstrFromDisp
VarBstrFromR8
VarBstrFromDate
VarBstrFromI8
VarBstrFromUI8
VarBstrFromI2
VarBstrFromUI4
user32
LoadCursorW
GetDC
CheckDlgButton
SetDlgItemTextW
GetWindowLongW
GetClientRect
PeekMessageW
ReleaseDC
SendMessageW
EnableWindow
IsRectEmpty
CheckRadioButton
GetDlgItemInt
ShowWindow
GetAsyncKeyState
GetWindowRect
DefWindowProcW
TranslateMessage
DestroyWindow
LoadStringW
ClientToScreen
SetDlgItemInt
DispatchMessageW
InvalidateRect
CreateDialogParamW
GetDlgItem
IsWindowVisible
SetCursor
IsWindow
GetDesktopWindow
MoveWindow
SetWindowLongW
kernel32
GetLocaleInfoA
GetCurrentProcess
LeaveCriticalSection
HeapFree
SetThreadPriority
IsBadCodePtr
GetThreadPriority
GetDiskFreeSpaceW
InterlockedIncrement
EnterCriticalSection
ResetEvent
GetCurrentProcessId
GetQueuedCompletionStatus
GetProcessHeap
GlobalAlloc
GetModuleFileNameA
GetLastError
InterlockedExchange
GlobalMemoryStatus
SetLastError
lstrlenA
MultiByteToWideChar
GlobalHandle
WideCharToMultiByte
lstrcpyA
CreateSemaphoreW
GetProcAddress
CreateThread
FreeLibrary
CreateEventW
LoadLibraryW
GetVersionExW
GetProfileIntA
CloseHandle
GlobalFree
SetUnhandledExceptionFilter
GetCurrentThread
GlobalLock
HeapAlloc
VirtualFree
SetEndOfFile
GetACP
GetFileAttributesW
InterlockedDecrement
SetEvent
WaitForSingleObject
InitializeCriticalSection
IsBadReadPtr
MulDiv
lstrcpyW
WaitForMultipleObjects
WriteFile
SetFilePointer
GetSystemTimeAsFileTime
lstrcmpiW
IsBadWritePtr
lstrlenW
QueryPerformanceCounter
GlobalFindAtomW
ReadFile
GetFileSize
GetFullPathNameW
CreateFileW
GetPrivateProfileStringW
GetTickCount
lstrcpynW
GlobalUnlock
ReleaseSemaphore
lstrcmpW
DeleteCriticalSection
msls31
LssbGetPlsrunsFromSubline
LsCompressSubline
LssbGetDurTrailWithPensInSubline
LssbGetObjDimSubline
LssbGetVisibleDcpInSubline
LssbGetNumberDnodesInSubline
msnetobj
DllGetClassObject
DllRegisterServer
DllCanUnloadNow
Sections
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ