Static task
static1
Behavioral task
behavioral1
Sample
3ad0b40277470b245a455fce2d56cbe370df8f0371df1d619afdb587ff21e61b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3ad0b40277470b245a455fce2d56cbe370df8f0371df1d619afdb587ff21e61b.exe
Resource
win10v2004-20220812-en
General
-
Target
3ad0b40277470b245a455fce2d56cbe370df8f0371df1d619afdb587ff21e61b
-
Size
1.4MB
-
MD5
2c73472ca6af27172da352f0b98ae1df
-
SHA1
f483e1c4929faee0ec20063131c139dfb5a2cc9e
-
SHA256
3ad0b40277470b245a455fce2d56cbe370df8f0371df1d619afdb587ff21e61b
-
SHA512
3502b2bb7b5b20c40aa713a55728072893236edd0edae0aea4ddb8c8be8778a4b5e73c5a086a4f1f452b39bbed587beebe1a700a6780c957094cc4ff910d2af5
-
SSDEEP
12288:fw8KMCe95rbz52+rhs5SQCVcW3D+YGj2T7M2H8a5fyoX9bQtWk3tBj184j3xNdNC:sMjDnw+r/h3n42TrHRfbW3t780jHu9
Malware Config
Signatures
Files
-
3ad0b40277470b245a455fce2d56cbe370df8f0371df1d619afdb587ff21e61b.exe windows x86
1a7360fbaa6406801159da800377b636
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiA
OutputDebugStringW
SetInformationJobObject
GetThreadPriority
GetStringTypeW
SetTapePosition
GetFileAttributesA
SetThreadPriority
GetLongPathNameA
GetTimeFormatA
SetCalendarInfoA
GetSystemDirectoryW
GetPrivateProfileSectionNamesA
DosDateTimeToFileTime
SetNamedPipeHandleState
AssignProcessToJobObject
CreateEventA
GetCPInfoExA
GetFullPathNameW
FlushInstructionCache
GetPrivateProfileStructA
WriteConsoleA
SetThreadContext
SetThreadLocale
OpenEventW
ReadFile
GetCalendarInfoW
GetConsoleAliasExesLengthW
GetPrivateProfileSectionA
WaitForSingleObjectEx
GetVolumeInformationA
GetEnvironmentStrings
SetFileTime
SetConsoleTextAttribute
Module32Next
Module32First
ConvertDefaultLocale
GetTempPathA
GetSystemDefaultLangID
FindNextFileA
CreateFileW
SetMailslotInfo
GetConsoleOutputCP
GetVolumeInformationW
DeleteTimerQueue
GetComputerNameA
ExpandEnvironmentStringsA
GetFileSizeEx
CreateWaitableTimerA
Toolhelp32ReadProcessMemory
GetConsoleAliasesW
SetCurrentDirectoryA
OpenMutexA
FindNextChangeNotification
lstrcmpW
GetLogicalDriveStringsW
GetProcessWorkingSetSize
GetVersion
CancelWaitableTimer
GetProcessTimes
SetVolumeMountPointA
SetCurrentDirectoryW
GetCompressedFileSizeA
FileTimeToSystemTime
DuplicateHandle
FoldStringA
GetUserDefaultLangID
DeleteTimerQueueTimer
TlsFree
GetProcessPriorityBoost
GetConsoleAliasExesLengthA
GetDiskFreeSpaceW
GetProfileIntW
CreateDirectoryA
GetFileSize
GetThreadLocale
GetSystemWindowsDirectoryW
SetFileAttributesA
GetLocalTime
Module32NextW
SetProcessPriorityBoost
FoldStringW
GetVolumeNameForVolumeMountPointA
Module32FirstW
LCMapStringW
DefineDosDeviceW
GetConsoleScreenBufferInfo
CreateJobObjectA
GetStringTypeA
GetNumberFormatA
CompareStringW
DeviceIoControl
SetErrorMode
CreateHardLinkA
GetUserDefaultLCID
CopyFileExW
CreateIoCompletionPort
CopyFileA
ChangeTimerQueueTimer
FreeUserPhysicalPages
MapUserPhysicalPages
GetOEMCP
DisconnectNamedPipe
GetConsoleAliasExesA
CreateSemaphoreW
SetWaitableTimer
SetStdHandle
VirtualAlloc
CreateJobObjectW
MultiByteToWideChar
HeapReAlloc
HeapAlloc
HeapSize
RtlUnwind
IsValidCodePage
GetCPInfo
Sleep
HeapFree
GetCurrentProcess
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
LoadLibraryW
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapCreate
InterlockedDecrement
IsProcessorFeaturePresent
GetLastError
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
DeleteCriticalSection
GetStartupInfoW
GetFileType
InitializeCriticalSectionAndSpinCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetModuleFileNameA
GetModuleFileNameW
GetStdHandle
WriteFile
DecodePointer
ExitProcess
SetUnhandledExceptionFilter
HeapSetInformation
GetCommandLineA
SetHandleCount
GlobalLock
GetDateFormatA
GetPrivateProfileIntW
OpenFileMappingA
ExpandEnvironmentStringsW
FindFirstFileA
GetVolumePathNameA
VerifyVersionInfoW
ReleaseMutex
GetNumberFormatW
SetSystemPowerState
GetBinaryTypeA
RemoveDirectoryW
CreateToolhelp32Snapshot
GetWindowsDirectoryA
CreateHardLinkW
ResetWriteWatch
RegisterWaitForSingleObject
ReleaseSemaphore
SetSystemTimeAdjustment
SetComputerNameExW
PrepareTape
FindFirstVolumeW
GetShortPathNameW
GetVolumePathNameW
GetProfileStringA
SearchPathA
CreateNamedPipeW
ResetEvent
CreateTimerQueue
EnumCalendarInfoA
GetLocaleInfoA
CreateMailslotW
OpenSemaphoreW
GetBinaryTypeW
GetFullPathNameA
lstrcpynA
GetProcessIoCounters
GetProfileStringW
VirtualProtect
GetEnvironmentVariableA
GetPrivateProfileStringW
UnregisterWaitEx
SetEvent
SetLocaleInfoW
MapViewOfFile
FileTimeToLocalFileTime
GetWindowsDirectoryW
SetPriorityClass
GetCurrentConsoleFont
GetFileInformationByHandle
GetCompressedFileSizeW
CreateMutexA
SetEnvironmentVariableA
GetProcAddress
GetSystemDefaultLCID
MapUserPhysicalPagesScatter
GetDriveTypeA
SetProcessWorkingSetSize
ReplaceFileA
FindVolumeClose
GetModuleHandleW
GetConsoleAliasA
CreateSemaphoreA
GetUserDefaultUILanguage
GetACP
GetConsoleWindow
rpcrt4
NdrMesProcEncodeDecode2
RpcAsyncInitializeHandle
RpcStringFreeA
NdrAllocate
NdrPointerFree
NdrMesTypeEncode2
RpcBindingSetOption
user32
DispatchMessageW
CreateMenu
GetAltTabInfoA
EndPaint
ReleaseCapture
CharToOemBuffA
RegisterClassExW
EndDeferWindowPos
CheckDlgButton
SetWindowPos
SetMenu
CharLowerA
IsIconic
DrawTextA
MessageBoxW
CopyRect
MsgWaitForMultipleObjectsEx
PeekMessageW
GetSubMenu
ShowCaret
MonitorFromRect
GetDC
DestroyAcceleratorTable
CharUpperA
HideCaret
LoadIconA
GetForegroundWindow
UpdateWindow
UnregisterClassW
DrawFocusRect
SetRect
OpenDesktopW
GetCapture
RegisterDeviceNotificationW
SetClipboardData
wvsprintfA
BringWindowToTop
DestroyCursor
TrackPopupMenuEx
DrawEdge
IsDialogMessageA
FillRect
LoadMenuA
CloseDesktop
SetDlgItemTextW
GetMessageW
GetMenuStringW
RegisterClipboardFormatW
RegisterWindowMessageW
DefWindowProcA
PtInRect
GetMenu
GetShellWindow
DestroyWindow
GetKeyboardLayoutList
GetAncestor
GetMenuItemInfoW
DialogBoxIndirectParamW
GetDlgItemTextW
CharUpperW
GetFocus
comctl32
ImageList_GetImageCount
FlatSB_GetScrollInfo
ImageList_AddMasked
ImageList_DragMove
ImageList_GetIcon
ImageList_GetDragImage
ImageList_GetBkColor
ImageList_Write
ImageList_DragShowNolock
ImageList_Draw
FlatSB_SetScrollPos
ImageList_BeginDrag
ImageList_GetIconSize
ImageList_SetDragCursorImage
ImageList_DragLeave
FlatSB_SetScrollInfo
ImageList_Create
ImageList_Replace
ImageList_Add
ImageList_LoadImageA
ImageList_Remove
CreatePropertySheetPageW
ImageList_Copy
advapi32
GetSecurityDescriptorControl
GetKernelObjectSecurity
LsaQueryInformationPolicy
RegSetValueExA
AreAllAccessesGranted
DeregisterEventSource
CreateProcessAsUserW
AddAce
GetUserNameW
RegDeleteKeyW
RegEnumValueW
AllocateAndInitializeSid
CheckTokenMembership
CryptAcquireContextA
AreAnyAccessesGranted
GetTokenInformation
RegCreateKeyExW
RegQueryMultipleValuesA
GetSidSubAuthority
RegSetValueA
RegQueryMultipleValuesW
RegSetValueW
SetKernelObjectSecurity
GetSidSubAuthorityCount
RegCreateKeyExA
GetCurrentHwProfileA
GetSidIdentifierAuthority
RegDeleteKeyA
InitializeSecurityDescriptor
RegSetValueExW
RegSetKeySecurity
InitializeAcl
GetCurrentHwProfileW
AddAccessAllowedAce
SetTokenInformation
AddAuditAccessAce
RegQueryValueExA
RegFlushKey
RegNotifyChangeKeyValue
AddAccessDeniedAce
SetFileSecurityW
GetSidLengthRequired
ChangeServiceConfigW
shell32
SHBrowseForFolderW
SHBindToParent
SHGetSpecialFolderPathW
SHGetDesktopFolder
SHGetFileInfoW
SHChangeNotify
ShellExecuteW
CommandLineToArgvW
SHGetFolderPathW
ShellExecuteExW
SHGetMalloc
SHGetSpecialFolderLocation
SHFileOperationW
ole32
StgConvertVariantToProperty
OleCreateEmbeddingHelper
HICON_UserUnmarshal
CoMarshalHresult
HPALETTE_UserSize
MonikerCommonPrefixWith
HWND_UserUnmarshal
CoSetProxyBlanket
CoCancelCall
CreatePointerMoniker
CoSuspendClassObjects
oleaut32
VariantCopy
SysAllocStringLen
SysAllocStringByteLen
SysStringLen
SafeArrayCreate
VariantInit
SafeArrayPtrOfIndex
VariantClear
SafeArrayGetUBound
GetActiveObject
SafeArrayGetLBound
VariantChangeTypeEx
VariantCopyInd
SysFreeString
VariantChangeType
GetErrorInfo
SysReAllocStringLen
Sections
.text Size: 1.3MB - Virtual size: 41.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 95KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ