Static task
static1
Behavioral task
behavioral1
Sample
3d548cea44f9fb5877c7ddc5a396cf2051b52811d78971b90f3d0287be6b8607.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3d548cea44f9fb5877c7ddc5a396cf2051b52811d78971b90f3d0287be6b8607.exe
Resource
win10v2004-20220812-en
General
-
Target
3d548cea44f9fb5877c7ddc5a396cf2051b52811d78971b90f3d0287be6b8607
-
Size
192KB
-
MD5
0d90c88f6df35533a553449a26050e00
-
SHA1
c7f43c3b15bad8aa441e40e9f5a6260fc618d314
-
SHA256
3d548cea44f9fb5877c7ddc5a396cf2051b52811d78971b90f3d0287be6b8607
-
SHA512
2331b0dba830570af54f3d80b3d5b8c5f83884242e84829eb9f309a085933c1319fe7c6f8ebac8934c9e1ab4f7bbf57e68a6e3fd9a75af52513a2b895b712f51
-
SSDEEP
3072:o95ldleSiijof0OZ/lnxQAc7rYeqFftRtSDADeak7dJHB/AdG6:o9pleSuf0OZ9nxQS1tSsQLH5AdR
Malware Config
Signatures
Files
-
3d548cea44f9fb5877c7ddc5a396cf2051b52811d78971b90f3d0287be6b8607.exe windows x86
5fd651ba3b3f2080f8c2d9f10e6ca8d3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
HeapReAlloc
HeapAlloc
VirtualAlloc
HeapFree
GetCommandLineA
GetProcessHeap
RtlUnwind
RaiseException
HeapSize
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
IsValidCodePage
Sleep
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
GetOEMCP
GetCPInfo
GetLocaleInfoA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
lstrcmpW
GetVersionExA
GetCurrentThreadId
CloseHandle
GlobalFlags
GetThreadLocale
lstrcmpA
GlobalGetAtomNameA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
FreeLibrary
InterlockedDecrement
InterlockedIncrement
GetModuleHandleA
GetProcAddress
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
FindResourceA
LoadResource
LockResource
SizeofResource
GetModuleFileNameA
CompareStringA
InterlockedExchange
GetVersion
lstrlenA
GetLastError
MultiByteToWideChar
GetStdHandle
WideCharToMultiByte
user32
DestroyMenu
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
PostQuitMessage
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetWindowPos
SetWindowLongA
IsWindow
GetDlgItem
GetSubMenu
SetWindowsHookExA
CallNextHookEx
DispatchMessageA
GetKeyState
PeekMessageA
ValidateRect
UnregisterClassA
GetFocus
GetMenuItemCount
GetMenuItemID
GetMenuState
GetSysColorBrush
GetSysColor
ReleaseDC
GetDC
GetSystemMetrics
LoadCursorA
UnhookWindowsHookEx
MessageBoxA
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
GetWindowTextA
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowPlacement
gdi32
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
DeleteObject
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
shell32
ShellExecuteA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ