Static task
static1
Behavioral task
behavioral1
Sample
3ad808a3118e728431999e8f0c63e031e19e37e0b08e2affdf6b03ab83bfde16.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3ad808a3118e728431999e8f0c63e031e19e37e0b08e2affdf6b03ab83bfde16.exe
Resource
win10v2004-20221111-en
General
-
Target
3ad808a3118e728431999e8f0c63e031e19e37e0b08e2affdf6b03ab83bfde16
-
Size
452KB
-
MD5
1f95c5849984464f24c1e7bd127cddda
-
SHA1
b0a5aa41fa6e4160132552b574110d055dd0a956
-
SHA256
3ad808a3118e728431999e8f0c63e031e19e37e0b08e2affdf6b03ab83bfde16
-
SHA512
090732e61b9b17e4fa35ffd1a385a216d34d1e72ddae542173a1656771632ffc23be34d102ca5527ba08c9bbffcfbc7fac7846630faaf743ed391657304d188e
-
SSDEEP
12288:s6yKCyefHnCZ9Wq2tEHcbBLiPA8whNE2TQOgb0kVKCwFP:lyP5fHnCZ9Wq67B+PAZk2TQpb0kVKzN
Malware Config
Signatures
Files
-
3ad808a3118e728431999e8f0c63e031e19e37e0b08e2affdf6b03ab83bfde16.exe windows x86
ff85d8fe352ce2faa44f169a1369eb8c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
OleLockRunning
CLSIDFromString
OleTranslateAccelerator
OleGetClipboard
OleCreateMenuDescriptor
IsAccelerator
CoTaskMemAlloc
CoTaskMemFree
OleDestroyMenuDescriptor
CoRevokeClassObject
RevokeDragDrop
CLSIDFromProgID
CoInitialize
user32
RegisterWindowMessageW
SystemParametersInfoW
SetCapture
TrackPopupMenuEx
GetTopWindow
IsZoomed
UpdateWindow
GetMenuState
GetSysColorBrush
GetWindowTextW
GetSubMenu
GetAsyncKeyState
LoadImageW
CheckMenuItem
DrawIconEx
SetRectEmpty
SetCursor
GetMenu
ReleaseDC
GetSystemMetrics
EndDeferWindowPos
ModifyMenuW
GetMessageTime
DestroyWindow
SendMessageW
OpenClipboard
IsMenu
GetWindowThreadProcessId
CreateWindowExW
GetDoubleClickTime
ReleaseCapture
ScreenToClient
EnableWindow
PeekMessageW
SetParent
MessageBeep
WaitForInputIdle
DrawFrameControl
DestroyCaret
SetWindowRgn
SetTimer
InsertMenuItemW
GetCursorPos
DestroyCursor
IsWindow
GetLastActivePopup
GetKeyState
ShowWindow
LoadIconW
BeginDeferWindowPos
AttachThreadInput
SetWindowPos
CreateDialogParamW
UnhookWindowsHookEx
SetClassLongW
InsertMenuW
PtInRect
IntersectRect
SetScrollInfo
CopyRect
EqualRect
ScrollWindow
IsWindowVisible
EnumWindows
IsRectEmpty
ValidateRect
CreateAcceleratorTableW
GetForegroundWindow
GetMenuItemCount
GetCapture
SetRect
GetWindowTextLengthW
MoveWindow
GetDlgCtrlID
DestroyMenu
SetForegroundWindow
GetNextDlgTabItem
CreateMenu
IsClipboardFormatAvailable
MessageBoxW
RegisterClassW
GetClassInfoW
IsWindowEnabled
FrameRect
OffsetRect
RegisterClassExW
TrackPopupMenu
SetClipboardData
SetWindowLongW
GetMessageW
GetUpdateRect
DefWindowProcW
SetWindowTextW
GetFocus
GetClassNameW
FillRect
CreateDialogIndirectParamW
SetCursorPos
shell32
SHBrowseForFolderA
ord155
DragQueryFileA
SHGetPathFromIDListA
SHFileOperationA
gdi32
GetFontData
GdiFlush
SelectPalette
LineTo
PolyBezierTo
DeleteDC
CreateCompatibleBitmap
GetObjectW
PtInRegion
CreateBitmap
EndPath
GetDIBits
LPtoDP
SetViewportExtEx
GetObjectA
GetStockObject
Ellipse
TextOutA
SetTextColor
CreatePen
GetRgnBox
Polygon
PaintRgn
OffsetRgn
CombineRgn
SelectClipRgn
CreateCompatibleDC
CreatePalette
SetWindowExtEx
CreateDIBSection
SetPixel
BeginPath
Rectangle
Polyline
GetBkColor
comctl32
InitCommonControlsEx
ImageList_ReplaceIcon
ImageList_GetIcon
ImageList_Destroy
kernel32
FreeEnvironmentStringsW
LoadLibraryA
RtlUnwind
TlsAlloc
HeapFree
GetEnvironmentStringsW
GlobalMemoryStatus
ExitProcess
HeapAlloc
SetStdHandle
GetSystemTimeAsFileTime
GetStringTypeW
FlushFileBuffers
UnhandledExceptionFilter
VirtualQuery
GetLocalTime
GetModuleFileNameW
GetTickCount
GetModuleFileNameA
GetProcAddress
InterlockedDecrement
GetCommandLineA
HeapCreate
GetSystemTime
GetLastError
GetStartupInfoW
GetCommandLineW
CompareStringA
GetStdHandle
GetTimeZoneInformation
TerminateProcess
GetCurrentThreadId
DeleteCriticalSection
GetModuleHandleA
SetEnvironmentVariableA
SetHandleCount
CopyFileA
InterlockedIncrement
VirtualAlloc
SetEvent
GetModuleHandleW
WriteFile
TlsSetValue
GetVersion
LeaveCriticalSection
GetCPInfo
WideCharToMultiByte
EnterCriticalSection
GetCurrentProcess
CloseHandle
HeapReAlloc
InitializeCriticalSection
GetFileType
SetFilePointer
ReadFile
GetStartupInfoA
IsBadWritePtr
QueryPerformanceCounter
VirtualFree
SetLastError
CompareStringW
FatalAppExitA
HeapDestroy
CreateMutexW
InterlockedExchange
TlsGetValue
GetStringTypeA
GetEnvironmentStrings
MultiByteToWideChar
LCMapStringW
GetCurrentProcessId
TlsFree
FreeEnvironmentStringsA
LCMapStringA
GetCurrentThread
shlwapi
PathFileExistsW
PathRemoveExtensionW
StrFormatByteSizeW
PathStripToRootW
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 254KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ