Static task
static1
Behavioral task
behavioral1
Sample
3d3ab93405ef7ecc950f5c9dfcffd9a4e860d7140c001e5e1415e3b5dd3a1360.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3d3ab93405ef7ecc950f5c9dfcffd9a4e860d7140c001e5e1415e3b5dd3a1360.exe
Resource
win10v2004-20220812-en
General
-
Target
3d3ab93405ef7ecc950f5c9dfcffd9a4e860d7140c001e5e1415e3b5dd3a1360
-
Size
160KB
-
MD5
2e1f6802a4dca9c67903ec19ae85a314
-
SHA1
b84dfb4552ee4a03649d216cd79fd6d8cb2b61ea
-
SHA256
3d3ab93405ef7ecc950f5c9dfcffd9a4e860d7140c001e5e1415e3b5dd3a1360
-
SHA512
029799dc905cc514218fe1ac1e84ca6d1af85585359af6bc94b3dfe417185ada7109405c1a118b46138a9b890d6e835f9ff8db48f00774b96c4dd7b8ca85d3d2
-
SSDEEP
1536:Po1+oJZFA9AfnbsMFqT+ZswU7mJyICCQwDy9zYCpz0yjH:Q1+cZikKT+ywUSJyIbQp9bp1
Malware Config
Signatures
Files
-
3d3ab93405ef7ecc950f5c9dfcffd9a4e860d7140c001e5e1415e3b5dd3a1360.exe windows x86
1012fd5f896cd2cfe378850978123ffb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
IsTextUnicode
RegCloseKey
RegSetValueA
RegOpenKeyA
RegQueryValueA
RegDeleteKeyA
DeregisterEventSource
ReportEventW
LookupAccountNameW
GetUserNameW
RegisterEventSourceW
RegCreateKeyA
ImpersonateLoggedOnUser
RegOpenKeyExA
RegOpenKeyExW
RegCreateKeyExA
RegCreateKeyExW
RegQueryValueExA
RegQueryValueExW
RegSetValueExA
RegSetValueExW
kernel32
InterlockedIncrement
InterlockedDecrement
EnterCriticalSection
DeleteCriticalSection
LeaveCriticalSection
GetLastError
ExitProcess
GetModuleHandleA
GetStartupInfoA
MultiByteToWideChar
GetCommandLineA
lstrlenW
GetCommandLineW
WideCharToMultiByte
GetModuleFileNameA
GetCPInfo
GetACP
FindClose
FindFirstFileA
DeleteFileA
FindFirstFileW
GetFileAttributesW
CloseHandle
SetEvent
CreateThread
CreateEventA
GetVersionExA
ReadFile
GetStdHandle
FreeLibrary
GetCurrentThreadId
GetProcAddress
LoadLibraryA
WriteFile
CreateFileA
GetModuleFileNameW
GetTickCount
GetFileType
GetUserDefaultLCID
FormatMessageA
LocalFree
LocalAlloc
FormatMessageW
HeapAlloc
GetProcessHeap
HeapFree
HeapReAlloc
UnmapViewOfFile
CreateFileW
MapViewOfFile
CreateFileMappingA
GetFileSize
lstrlenA
GetLocaleInfoA
lstrcpyA
GetPrivateProfileStringA
GetPrivateProfileStringW
GetPrivateProfileIntA
GetPrivateProfileIntW
GetFullPathNameA
GetFullPathNameW
InitializeCriticalSection
GetFileAttributesA
user32
PostMessageA
TranslateMessage
SendMessageA
IsWindowVisible
EnumThreadWindows
KillTimer
MsgWaitForMultipleObjects
PeekMessageA
CharNextA
DispatchMessageA
GetMessageA
LoadStringW
wsprintfA
LoadStringA
wsprintfW
CreateWindowExA
GetClassInfoA
RegisterClassA
PostQuitMessage
GetWindowLongA
SetWindowLongA
GetParent
SetTimer
DefWindowProcA
GetActiveWindow
PostThreadMessageA
MessageBoxW
ole32
CreateBindCtx
CoGetMalloc
CoGetClassObject
CreateFileMoniker
CLSIDFromProgID
CLSIDFromString
CoInitializeSecurity
MkParseDisplayName
StringFromCLSID
CoRegisterClassObject
CoRevokeClassObject
CoCreateInstance
CoMarshalInterThreadInterfaceInStream
CoInitialize
CoUninitialize
CoGetInterfaceAndReleaseStream
CoRegisterMessageFilter
oleaut32
SetErrorInfo
SafeArrayGetLBound
VariantInit
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayPutElement
VariantClear
SafeArrayCreate
UnRegisterTypeLi
LoadTypeLibEx
SafeArrayDestroy
SysAllocStringLen
SysAllocString
SysStringLen
SysAllocStringByteLen
LoadTypeLi
VariantCopy
SysFreeString
LoadRegTypeLi
VariantChangeType
CreateErrorInfo
SafeArrayCopy
imm32
ImmGetDefaultIMEWnd
version
GetFileVersionInfoSizeA
GetFileVersionInfoW
VerQueryValueA
GetFileVersionInfoA
VerQueryValueW
GetFileVersionInfoSizeW
msvcrt
_ftol
_itow
_endthread
_beginthread
sprintf
free
malloc
wcsrchr
tmpnam
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE