Static task
static1
Behavioral task
behavioral1
Sample
3446a57024b50b81fa026fe817eceeef41d122d28f6ab39ce64c13bfdb684f7d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3446a57024b50b81fa026fe817eceeef41d122d28f6ab39ce64c13bfdb684f7d.exe
Resource
win10v2004-20220812-en
General
-
Target
3446a57024b50b81fa026fe817eceeef41d122d28f6ab39ce64c13bfdb684f7d
-
Size
392KB
-
MD5
01773951f10cd40bdcd6f7f1a35d8a10
-
SHA1
7261842bea6893f7c0a94958b22ab11a586d4d82
-
SHA256
3446a57024b50b81fa026fe817eceeef41d122d28f6ab39ce64c13bfdb684f7d
-
SHA512
5883ebfd72a01d867532601a0809ac15ef63b2ccced09105dfcd5aba09ec12b8e9ac8692b012bdd8e7215fb94c29f0502eedbe9366d15adfa386722ad7be2c48
-
SSDEEP
6144:r2+TcshU5Zb4Lvmr4sjfN9WTW3sEkbBOVT3m3+cvHJH4Yw+3EOHXYJn:r2RbEm4sjvW5EkbVHJHk+bY
Malware Config
Signatures
Files
-
3446a57024b50b81fa026fe817eceeef41d122d28f6ab39ce64c13bfdb684f7d.exe windows x86
345e89fa6bbbab1b3deecca8d22e414a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
TerminateProcess
HeapFree
RaiseException
HeapAlloc
HeapSize
GetCPInfo
GetACP
GetOEMCP
HeapReAlloc
UnhandledExceptionFilter
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStdHandle
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
VirtualAlloc
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
GetModuleHandleA
GetCommandLineA
GetStartupInfoA
GetCurrentProcess
SetStdHandle
GetLocaleInfoA
GetLocaleInfoW
LCMapStringA
LCMapStringW
lstrcmpA
GetVersionExA
lstrcmpiA
lstrcatA
lstrcpyA
_lopen
_llseek
GlobalAlloc
_hread
_lclose
lstrlenA
FreeLibrary
SetLastError
LocalFree
IsDBCSLeadByte
GlobalFlags
GlobalLock
GlobalUnlock
RtlUnwind
SizeofResource
SetErrorMode
FindFirstFileA
GetFullPathNameA
GetVolumeInformationA
FindClose
WriteFile
FlushFileBuffers
SetFilePointer
IsBadReadPtr
LocalAlloc
GlobalFree
GetProcessVersion
GetVersion
WritePrivateProfileStringA
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
LoadLibraryA
TlsAlloc
GlobalHandle
DeleteCriticalSection
MulDiv
InitializeCriticalSection
lstrcpynA
GlobalDeleteAtom
WideCharToMultiByte
GetCurrentThread
GetCurrentThreadId
ReadFile
InterlockedDecrement
InterlockedIncrement
FindResourceA
LoadResource
LockResource
MultiByteToWideChar
GetTickCount
CreateFileA
DeviceIoControl
CreateProcessA
GetUserDefaultLangID
GetModuleFileNameA
CloseHandle
WaitForSingleObject
OpenProcess
IsBadWritePtr
GetLastError
IsBadCodePtr
VirtualFree
GetProcAddress
GetProfileStringA
GlobalAddAtomA
user32
GetClientRect
AdjustWindowRectEx
IsWindow
SetActiveWindow
GetSysColor
MapWindowPoints
SystemParametersInfoA
LoadIconA
CreateDialogIndirectParamA
EndDialog
LoadStringA
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
GetClassNameA
PtInRect
ClientToScreen
GetSysColorBrush
DestroyMenu
InflateRect
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetMenu
DefWindowProcA
DestroyWindow
SetPropA
UnhookWindowsHookEx
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetPropA
RemovePropA
CallWindowProcA
GetMessageTime
SetFocus
IsWindowEnabled
GetWindowTextLengthA
GetWindowTextA
GetWindowLongA
IsDialogMessageA
SendDlgItemMessageA
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
SetCursor
PostQuitMessage
CharUpperA
SetWindowLongA
CreateWindowExA
SetWindowWord
IntersectRect
GetSystemMetrics
SetWindowTextA
ShowWindow
LoadBitmapA
ReleaseDC
GetDlgItem
GetWindow
SetWindowPos
GetWindowRect
ScreenToClient
InvalidateRect
PostMessageA
MessageBoxA
GetDC
PeekMessageA
KillTimer
SetTimer
wsprintfA
SendMessageA
GetMessagePos
RegisterWindowMessageA
GetDlgCtrlID
GetParent
EnableWindow
LoadCursorA
UpdateWindow
IsCharAlphaA
IsCharAlphaNumericA
CharNextA
CharPrevA
GetNextDlgTabItem
GetFocus
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
IsIconic
OffsetRect
IsWindowUnicode
UnregisterClassA
WindowFromPoint
gdi32
GetDeviceCaps
CreateDIBitmap
RealizePalette
SelectPalette
GetTextExtentPointA
SelectObject
CreatePalette
CreateCompatibleDC
FillRgn
BitBlt
CreateRectRgn
GetObjectA
CombineRgn
SetTextColor
SetBkColor
CreateBitmap
SaveDC
DeleteDC
GetStockObject
SetBkMode
RestoreDC
SetViewportOrgEx
OffsetViewportOrgEx
SetMapMode
ScaleViewportExtEx
SetViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
IntersectClipRect
CreateSolidBrush
PtVisible
TextOutA
ExtTextOutA
RectVisible
Escape
PatBlt
DeleteObject
winspool.drv
OpenPrinterA
ClosePrinter
DeletePrinter
AddPrinterA
DeletePrinterConnectionA
GetPrinterDriverA
GetPrinterA
SetPrinterA
GetPrinterDataA
DocumentPropertiesA
EnumPortsA
GetPrinterDriverDirectoryA
EnumPrintersA
advapi32
RegEnumValueA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyExA
RegCloseKey
comctl32
ord17
ImageList_Destroy
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 115KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
�ZpA� Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE