Static task
static1
Behavioral task
behavioral1
Sample
3d444450689b81ca884bd11705f39847f2858146ec4570bb96063ba79f3888fe.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3d444450689b81ca884bd11705f39847f2858146ec4570bb96063ba79f3888fe.exe
Resource
win10v2004-20220812-en
General
-
Target
3d444450689b81ca884bd11705f39847f2858146ec4570bb96063ba79f3888fe
-
Size
697KB
-
MD5
371416b285caa52a7c45651f897ed021
-
SHA1
a2dd6a86ea1b917646d8f323b4fa2a43dc9009d7
-
SHA256
3d444450689b81ca884bd11705f39847f2858146ec4570bb96063ba79f3888fe
-
SHA512
1d22eaa0ff371e2749b08c44371d420f246171b94549b5fd6777afba46b9f3f8caeff8ec37dedc4a895fb5e68e51d8e02e0c871af53ce3231b33f580a94aae3c
-
SSDEEP
12288:cmyQ0sbYgpp+hWsdtVUz1Ig64oC9d0XGORLKhnjCh2fY8np:cvPgIWuVUzmP4BwfRLK9jCInp
Malware Config
Signatures
Files
-
3d444450689b81ca884bd11705f39847f2858146ec4570bb96063ba79f3888fe.exe windows x86
59e32cf8729f267488e8b67242619951
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OutputDebugStringA
CreateThread
lstrcpyA
SwitchToThread
LoadLibraryA
EnterCriticalSection
VirtualAlloc
GetProcAddress
GetLastError
LeaveCriticalSection
Sleep
InitializeCriticalSection
GetProcessHeap
ExitProcess
WaitForSingleObject
HeapFree
HeapAlloc
GetVolumeInformationW
ntdll
strcat
memset
strcpy
RtlUnwind
user32
EmptyClipboard
GetActiveWindow
wvsprintfA
advapi32
RegQueryValueA
RegOpenKeyA
RegCloseKey
opengl32
glLoadIdentity
glEnable
glLightfv
glLineWidth
glViewport
glMatrixMode
glBlendFunc
glPolygonMode
glColor3d
glBegin
glClear
glOrtho
glPointSize
glEnd
glVertex3d
glLineStipple
glDisable
d3d9
Direct3DCreate9
secur32
LsaFreeReturnBuffer
Sections
.text Size: 634KB - Virtual size: 633KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 696B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ