Static task
static1
Behavioral task
behavioral1
Sample
3e61017268b0e4f607b69ea669a0fdc3a4a7643692faff68f765f4122725129c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3e61017268b0e4f607b69ea669a0fdc3a4a7643692faff68f765f4122725129c.exe
Resource
win10v2004-20220812-en
General
-
Target
3e61017268b0e4f607b69ea669a0fdc3a4a7643692faff68f765f4122725129c
-
Size
142KB
-
MD5
6e9abd029d8997f64046f9366dbe99e2
-
SHA1
b7cde353f78c8169a35173a9a6b36673361e70b1
-
SHA256
3e61017268b0e4f607b69ea669a0fdc3a4a7643692faff68f765f4122725129c
-
SHA512
3ba6c1fc0fe1c787d768c2c5eade81d6b071f45e8366d25130bf5acdae381e9e15a26ea8f90841ddeb4dc5fee180036f504ecf37c5344d362d44a818da58cd7f
-
SSDEEP
3072:dFcj+vpkHo+fabLximNEo5JKGv8mDF9IuWLsHZkTTDTY:cj+vWJapEGEmD7WL
Malware Config
Signatures
Files
-
3e61017268b0e4f607b69ea669a0fdc3a4a7643692faff68f765f4122725129c.exe windows x86
37c275d5d490bb4599be062c92b4f4c9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42u
ord1771
ord6451
ord922
ord4272
ord1735
ord940
ord5706
ord6919
ord6218
ord6868
ord2933
ord1775
ord801
ord686
ord6139
ord384
ord541
ord798
ord1989
ord6874
ord6278
ord5461
ord3313
ord5188
ord533
ord6403
ord2089
ord640
ord2442
ord1633
ord323
ord3093
ord4219
ord5604
ord2809
ord6655
ord6219
ord1900
ord1683
ord2520
ord6051
ord1768
ord5284
ord4433
ord2046
ord4425
ord4050
ord771
ord4254
ord1143
ord2859
ord5845
ord3470
ord3471
ord4709
ord4667
ord4269
ord6371
ord4480
ord2546
ord2504
ord5727
ord3917
ord1089
ord5193
ord2388
ord3341
ord5296
ord5298
ord4074
ord4692
ord5303
ord5285
ord5710
ord4616
ord4418
ord3733
ord561
ord815
ord1220
ord1203
ord6211
ord2717
ord1008
ord617
ord2613
ord5208
ord296
ord1131
ord2362
ord6024
ord5605
ord1569
ord5679
ord6654
ord942
ord2606
ord489
ord1165
ord4197
ord2756
ord823
ord4253
ord768
ord4829
ord5283
ord4848
ord4371
ord4942
ord4970
ord4736
ord4899
ord5154
ord5156
ord825
ord5155
ord1899
ord3172
ord4124
ord3092
ord6279
ord2776
ord535
ord6921
ord2757
ord5618
ord2755
ord927
ord925
ord858
ord2810
ord6563
ord3087
ord355
ord2507
ord3494
ord540
ord5949
ord538
ord4155
ord861
ord800
ord542
ord802
ord2293
ord641
ord4229
ord324
ord3592
ord4419
ord4621
ord4075
ord3074
ord3820
ord3826
ord3825
ord2971
ord3076
ord2980
ord3257
ord3131
ord4459
ord3254
ord3142
ord2977
ord5273
ord2116
ord2438
ord5257
ord1720
ord5059
ord3744
ord6372
ord2047
ord2640
ord4435
ord4831
ord3793
ord5276
ord4347
ord6370
ord5157
ord2377
ord5237
ord4401
ord1767
ord4073
ord6048
ord2506
ord4704
ord4992
ord4847
ord4370
ord5261
ord496
msvcrt
wcscmp
_wcsicmp
wcscpy
_wmakepath
wcsncmp
wcslen
wcsncpy
_wtoi
_wtol
ceil
_ftol
malloc
free
realloc
iswdigit
_c_exit
_exit
_CxxThrowException
exit
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__CxxFrameHandler
_itow
wcscat
?terminate@@YAXXZ
??1type_info@@UAE@XZ
__dllonexit
_onexit
_controlfp
_except_handler3
wcscoll
_purecall
_XcptFilter
_cexit
advapi32
RegCreateKeyExW
RegQueryValueExA
RegCloseKey
RegQueryValueExW
RegSetValueExW
RegOpenKeyExW
QueryServiceConfigW
RegDeleteValueW
CloseServiceHandle
ChangeServiceConfigW
OpenServiceW
OpenSCManagerW
EnumServicesStatusW
RegDeleteKeyW
RegOpenKeyExA
RegEnumKeyExW
RegEnumValueW
RegQueryInfoKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
kernel32
FindNextFileW
FindClose
CreateThread
WaitForSingleObject
MoveFileExW
GetLastError
GetDriveTypeW
GetSystemDirectoryW
lstrlenW
GetCurrentThreadId
GlobalAlloc
lstrlenA
CloseHandle
ReadFile
GetFileSize
CreateFileW
SetEndOfFile
WriteFile
SetFilePointer
SetFileAttributesW
GetFileAttributesW
lstrcmpW
GlobalMemoryStatus
GetSystemInfo
GlobalUnlock
GlobalLock
FindFirstFileW
GlobalFree
GlobalHandle
FindResourceW
CreateSemaphoreW
CreateDirectoryW
lstrcpyW
lstrcmpiW
lstrcpynW
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
lstrcatW
GetModuleFileNameW
FreeLibrary
GetProcAddress
LoadLibraryW
GetModuleHandleW
SizeofResource
LoadLibraryExW
GetShortPathNameW
GetCommandLineW
OpenProcess
GetCurrentProcessId
GetModuleHandleA
GetStartupInfoW
DeleteFileW
CopyFileW
ExpandEnvironmentStringsW
MultiByteToWideChar
WideCharToMultiByte
FlushInstructionCache
GetCurrentProcess
HeapFree
GetProcessHeap
HeapAlloc
LeaveCriticalSection
FreeResource
EnterCriticalSection
LockResource
LoadLibraryA
LoadResource
gdi32
DeleteObject
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
DeleteDC
GetStockObject
GetObjectW
GetDeviceCaps
SelectObject
GetTextMetricsW
GetTextExtentPoint32W
CreateSolidBrush
user32
IsWindow
ExitWindowsEx
SetForegroundWindow
GetLastActivePopup
FindWindowW
IsIconic
CharNextW
LoadIconW
GetActiveWindow
DialogBoxIndirectParamW
RegisterWindowMessageW
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
CreateWindowExW
GetClassInfoExW
LoadCursorW
RegisterClassExW
CreateAcceleratorTableW
CheckDlgButton
EnableWindow
SendMessageW
GetClientRect
GetFocus
MessageBoxW
IsWindowEnabled
ShowWindow
PostMessageW
SetFocus
GetParent
CallWindowProcW
SetWindowLongW
GetWindowLongW
ScreenToClient
GetMessagePos
GetProcessDefaultLayout
ReleaseDC
GetDC
GetAsyncKeyState
DefWindowProcW
GetSysColor
GetDesktopWindow
ReleaseCapture
SetCapture
InvalidateRect
InvalidateRgn
GetWindow
IsChild
EndPaint
FillRect
BeginPaint
GetDlgItem
SetWindowPos
wsprintfW
RedrawWindow
GetClassNameW
DestroyWindow
EndDialog
GetDlgItemTextW
IsDlgButtonChecked
SetDlgItemTextW
oleaut32
RegisterTypeLi
SysAllocString
SysAllocStringLen
SysStringLen
VariantClear
LoadRegTypeLi
VarUI4FromStr
SysFreeString
LoadTypeLi
ole32
CoTaskMemRealloc
CoInitializeEx
CoRevokeClassObject
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CLSIDFromString
CLSIDFromProgID
OleLockRunning
CoTaskMemAlloc
StringFromCLSID
CoTaskMemFree
CoInitialize
CoCreateInstance
CoUninitialize
CoRegisterClassObject
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
shell32
SHGetSpecialFolderPathW
ShellExecuteW
SHGetMalloc
SHBrowseForFolderW
SHGetPathFromIDListW
Sections
.text Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ