Static task
static1
Behavioral task
behavioral1
Sample
1c3aa363e623c4a658ec5eadedc3dff64f30a45dc3d8bdc1f04ac7b42b3c497f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1c3aa363e623c4a658ec5eadedc3dff64f30a45dc3d8bdc1f04ac7b42b3c497f.exe
Resource
win10v2004-20220812-en
General
-
Target
1c3aa363e623c4a658ec5eadedc3dff64f30a45dc3d8bdc1f04ac7b42b3c497f
-
Size
700KB
-
MD5
085457f175e6777d10c332534e2748a1
-
SHA1
b8e4fcaf412802dfc57adec7f743fee1d51b806f
-
SHA256
1c3aa363e623c4a658ec5eadedc3dff64f30a45dc3d8bdc1f04ac7b42b3c497f
-
SHA512
b91577c2e6382096a442e9ef1b613eb864d335f6971838a6e96f600a0541b834597827c27e1a107e5a214acc4d04e55794c8699c55f8abd4cfd92f25eeca265c
-
SSDEEP
12288:M8kgjucTdz2oWdCspy/uiTfbXfZkRpYwpYwAB/X1ECmpMEQ+TTKeKOrw:hk6ucTdCoWUyyWiTbxcRpY1BeC6Q+dKT
Malware Config
Signatures
Files
-
1c3aa363e623c4a658ec5eadedc3dff64f30a45dc3d8bdc1f04ac7b42b3c497f.exe windows x86
2fb33e0b6d43d77e78650064b005f6e3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetSaveFileNameW
PrintDlgW
kernel32
FreeLibrary
CreateMutexA
lstrcpyW
VirtualProtect
GetStringTypeA
GetStdHandle
WriteConsoleA
VirtualAlloc
UnmapViewOfFile
DeleteFileA
GetStartupInfoA
CompareStringA
GetModuleHandleA
GetSystemTimeAsFileTime
GlobalFree
lstrcmpA
FlushFileBuffers
SetThreadPriority
GetProfileIntA
CreateDirectoryA
lstrcmpW
GetCurrentDirectoryA
RtlUnwind
CreateProcessA
GetOEMCP
SetEndOfFile
GetEnvironmentStringsW
TerminateProcess
HeapReAlloc
DeleteCriticalSection
LCMapStringA
WinExec
lstrcpynA
GetCPInfo
CompareStringW
GetShortPathNameA
ResumeThread
GetVolumeInformationA
LocalFree
IsBadCodePtr
WideCharToMultiByte
ReadFile
GetCurrentThreadId
LoadLibraryA
GetTimeFormatA
GetLocaleInfoA
SetUnhandledExceptionFilter
HeapDestroy
FindResourceA
GetSystemInfo
HeapAlloc
GetModuleFileNameA
SetFilePointer
RaiseException
QueryPerformanceCounter
GetCurrentProcessId
FindNextFileA
WaitForSingleObject
GetStringTypeW
SuspendThread
LCMapStringW
WriteFile
FreeEnvironmentStringsW
LocalReAlloc
TlsFree
WaitForMultipleObjects
VirtualFree
SetStdHandle
GlobalAlloc
GlobalGetAtomNameA
SetFileAttributesA
GetFileSize
lstrcmpiA
LoadResource
TlsAlloc
InitializeCriticalSection
SizeofResource
InterlockedIncrement
InterlockedExchange
CreateEventA
GetVersion
GetCurrentThread
GlobalHandle
LockResource
SetLastError
GetProcAddress
GetCurrentProcess
ConvertDefaultLocale
CreateFileA
SystemTimeToFileTime
GetACP
FindFirstFileA
FileTimeToSystemTime
GetCommandLineA
GetLocaleInfoW
SetHandleCount
GetTickCount
IsBadWritePtr
GetEnvironmentStrings
FreeResource
HeapSize
GlobalDeleteAtom
GetLogicalDriveStringsA
GetFullPathNameA
TlsSetValue
GetFileType
GetDateFormatA
HeapCreate
GetFileAttributesA
GetTimeZoneInformation
GetProcessHeap
GetVersionExA
FreeEnvironmentStringsA
lstrcpyA
LeaveCriticalSection
GetUserDefaultLCID
SetEnvironmentVariableA
HeapFree
MultiByteToWideChar
GetWindowsDirectoryA
CloseHandle
EnumSystemLocalesA
GetDiskFreeSpaceA
TerminateThread
UnhandledExceptionFilter
VirtualQuery
EnterCriticalSection
GetFileTime
MulDiv
GetEnvironmentVariableA
ExitProcess
GetDriveTypeA
IsBadReadPtr
GetLastError
TlsGetValue
OpenProcess
user32
GetMenuStringA
RegisterClassA
SetWindowTextA
DestroyWindow
CheckMenuItem
SetRect
AppendMenuA
SetWindowContextHelpId
SetClipboardData
ScreenToClient
RegisterClassExA
OffsetRect
GetParent
CreateDialogIndirectParamA
MoveWindow
wsprintfA
GetWindowRect
GetWindowLongA
SetWindowRgn
GetWindowTextLengthA
LoadCursorA
InvalidateRgn
SetCapture
CallNextHookEx
DeleteMenu
GetKeyNameTextA
TrackPopupMenu
CallWindowProcA
RegisterWindowMessageA
GetSysColorBrush
TranslateMessage
DrawTextExA
LoadBitmapA
FindWindowExA
GetSystemMetrics
MessageBoxA
IsDialogMessageA
GetSysColor
LoadImageA
DrawEdge
IsZoomed
LoadIconA
DestroyIcon
SetFocus
DrawFocusRect
SetWindowPos
SetMenu
SetParent
GetWindowPlacement
GetWindowDC
GetClientRect
GetWindow
IsWindowEnabled
SystemParametersInfoA
FindWindowA
GetClassInfoA
WindowFromPoint
CharNextA
SetScrollPos
LoadStringA
EndDialog
IsChild
advapi32
RegCloseKey
RegQueryValueA
RegOpenKeyExA
SetFileSecurityA
gdi32
OffsetViewportOrgEx
CreateEllipticRgn
SetStretchBltMode
GetWindowExtEx
DPtoLP
ScaleWindowExtEx
SelectObject
DeleteObject
AbortDoc
CloseEnhMetaFile
CreateBrushIndirect
ScaleViewportExtEx
FrameRgn
OffsetClipRgn
SetPolyFillMode
SetAbortProc
DeleteDC
CreateEnhMetaFileA
RoundRect
CreateDCA
CombineRgn
CloseFigure
GetBitmapDimensionEx
EqualRgn
GetTextAlign
SetBitmapDimensionEx
GetTextExtentPointA
GetDeviceCaps
StretchDIBits
PolyPolygon
GetObjectA
shell32
DragQueryFileA
SHGetMalloc
DragFinish
ord155
comctl32
ImageList_ReplaceIcon
CreatePropertySheetPageA
Sections
.text Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 472KB - Virtual size: 469KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ