Static task
static1
Behavioral task
behavioral1
Sample
3ed2e0f4471e8050c5eae7e6f2e68707c6aab67c275a9dac2647e4dd0babdcd3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3ed2e0f4471e8050c5eae7e6f2e68707c6aab67c275a9dac2647e4dd0babdcd3.exe
Resource
win10v2004-20220901-en
General
-
Target
3ed2e0f4471e8050c5eae7e6f2e68707c6aab67c275a9dac2647e4dd0babdcd3
-
Size
796KB
-
MD5
8a9d2fb592f32b0fb65eb341b635d999
-
SHA1
511a363f85cc54e5cb7de7474c7b441d500b5de0
-
SHA256
3ed2e0f4471e8050c5eae7e6f2e68707c6aab67c275a9dac2647e4dd0babdcd3
-
SHA512
fc4c03b4319c018dad0d4fe701621c93d59c0df27bad82b1a340b0ca50fb7e79d7e8105aed145026ee71f2be9f73a8177bdd589696adfe91a94f05f85d493c4e
-
SSDEEP
24576:BPr+iaOn99OD/V9KiwuuKPsLsYDnVmaXAabnjm:r69Ki05LPAcfzC
Malware Config
Signatures
Files
-
3ed2e0f4471e8050c5eae7e6f2e68707c6aab67c275a9dac2647e4dd0babdcd3.exe windows x86
d989466fa6df036e3d8bd29a414b8751
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
DragAcceptFiles
DragFinish
DragQueryPoint
SHGetSettings
comdlg32
FindTextA
user32
ChangeDisplaySettingsW
AppendMenuA
UnloadKeyboardLayout
CharUpperBuffA
ClipCursor
ToAsciiEx
MapDialogRect
EnumDesktopsA
CharLowerBuffW
UnregisterClassW
UnregisterHotKey
OemKeyScan
SetActiveWindow
ChangeDisplaySettingsExA
DialogBoxIndirectParamA
OemToCharW
GetClipCursor
SetRectEmpty
DlgDirSelectComboBoxExW
SetDlgItemTextA
RemovePropA
OpenIcon
CloseWindowStation
CreateIconIndirect
CharPrevExA
ShowCursor
CreateCursor
InflateRect
RegisterDeviceNotificationW
MenuItemFromPoint
GetWindowRect
ReuseDDElParam
SetMessageQueue
CreateDesktopA
SetKeyboardState
OpenInputDesktop
RegisterClassExA
RegisterClassA
GetMenuDefaultItem
ShowWindowAsync
DlgDirSelectExW
SetWindowsHookW
SetWindowRgn
GetDlgCtrlID
GetInputState
TrackMouseEvent
InSendMessage
kernel32
CreateMutexA
GetLastError
ExpandEnvironmentStringsW
LockFile
GetConsoleCP
VirtualFree
LeaveCriticalSection
VirtualAlloc
ExitProcess
GetCurrentThreadId
GetLocaleInfoW
GetOEMCP
InitializeCriticalSection
DebugBreak
InterlockedExchange
VirtualProtect
GetCurrentProcessId
WideCharToMultiByte
GetTimeZoneInformation
WriteFile
HeapReAlloc
ReadFile
EnterCriticalSection
SetHandleCount
FreeEnvironmentStringsA
QueryPerformanceCounter
HeapFree
WriteConsoleInputW
TerminateProcess
OpenMutexA
GetVersionExA
IsBadWritePtr
GetCPInfo
GetCurrentThread
GetTimeFormatA
SetStdHandle
GetEnvironmentStringsW
CloseHandle
HeapAlloc
GetProcAddress
CompareStringW
GlobalFindAtomA
GetACP
GetModuleHandleA
TlsFree
UnhandledExceptionFilter
GetModuleFileNameA
GetStartupInfoA
GetUserDefaultLCID
IsValidCodePage
LCMapStringA
EnumSystemLocalesA
GetTickCount
VirtualQuery
SetThreadAffinityMask
DeleteCriticalSection
GetFileType
GetSystemTimeAsFileTime
GetDateFormatA
LCMapStringW
FreeEnvironmentStringsW
GetCommandLineA
SetEnvironmentVariableA
TlsAlloc
GetStartupInfoW
lstrcatA
MultiByteToWideChar
GetCurrentProcess
GetLocaleInfoA
GetFullPathNameW
HeapDestroy
GetEnvironmentStrings
TlsSetValue
GetStringTypeA
IsValidLocale
HeapSize
SetLastError
GetCommandLineW
HeapCreate
FlushFileBuffers
CompareStringA
lstrcpynA
GetSystemInfo
GetStringTypeW
SetFilePointer
GetModuleFileNameW
RtlUnwind
GetStdHandle
TlsGetValue
LoadLibraryA
gdi32
PolyTextOutA
GetROP2
CombineTransform
ExtFloodFill
GetBitmapDimensionEx
StartDocW
DeviceCapabilitiesExW
GetDeviceCaps
SetPaletteEntries
GetObjectW
GetOutlineTextMetricsA
CreatePenIndirect
SelectClipPath
DeleteDC
CreateDCW
wininet
InternetConnectA
FtpRenameFileW
CreateUrlCacheContainerW
comctl32
ImageList_Create
_TrackMouseEvent
ImageList_SetFilter
InitCommonControlsEx
CreatePropertySheetPageA
Sections
.text Size: 228KB - Virtual size: 225KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 408KB - Virtual size: 405KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 136KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ