Static task
static1
Behavioral task
behavioral1
Sample
a3cd13d7d9f51dabcd306cd073d41f54d028817d123ddee23b7c0da76ad353a5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a3cd13d7d9f51dabcd306cd073d41f54d028817d123ddee23b7c0da76ad353a5.exe
Resource
win10v2004-20220901-en
General
-
Target
a3cd13d7d9f51dabcd306cd073d41f54d028817d123ddee23b7c0da76ad353a5
-
Size
332KB
-
MD5
7a38eb69d281f521e4c523b597a651cc
-
SHA1
2aea42e5785823c35d6dc2eff597ad915c32b61e
-
SHA256
a3cd13d7d9f51dabcd306cd073d41f54d028817d123ddee23b7c0da76ad353a5
-
SHA512
8e79d3d961982bc2e869b1f5d7b8d501a31a353b5eacf1be3f8f360c1b4abd3cd0f35b6ce91d693a13704bd9f5dc43801b7c1592a7709ac7074cc2cc9f789a33
-
SSDEEP
6144:plVWkJG+KUnnS8oy1+LFwSfWLZfe26xBQoOIdUiF5Nl9+G6c:ZWkcl0poe+LOSUp96xBQSUcn9+G6c
Malware Config
Signatures
Files
-
a3cd13d7d9f51dabcd306cd073d41f54d028817d123ddee23b7c0da76ad353a5.exe windows x86
163df062a314ddbce9d13d328e543a72
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
kernel32
SetErrorMode
WriteFile
SetFilePointer
FlushFileBuffers
GetCPInfo
GetOEMCP
GetCurrentProcess
RtlUnwind
GetStartupInfoA
ExitProcess
HeapAlloc
HeapFree
TerminateProcess
RaiseException
GetProcessVersion
GlobalGetAtomNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FreeLibrary
GetVersionExA
FindFirstFileA
FindNextFileA
FindClose
lstrlenA
GetVersion
GetModuleHandleA
GlobalAddAtomA
GlobalFindAtomA
WritePrivateProfileStringA
lstrcatA
GlobalFlags
LocalReAlloc
TlsGetValue
GlobalReAlloc
TlsSetValue
EnterCriticalSection
GlobalHandle
LeaveCriticalSection
TlsFree
DeleteCriticalSection
GlobalUnlock
GlobalFree
LocalAlloc
TlsAlloc
InitializeCriticalSection
MultiByteToWideChar
lstrcpynA
lstrcpyA
SetLastError
InterlockedIncrement
WideCharToMultiByte
InterlockedDecrement
CloseHandle
GlobalDeleteAtom
GlobalLock
GlobalAlloc
GetCurrentThread
lstrcmpA
lstrcmpiA
GetLastError
GetCurrentThreadId
LoadLibraryA
LocalFree
GetDriveTypeA
GetProcAddress
GetVolumeInformationA
GetSystemDirectoryA
CreateProcessA
WaitForSingleObject
CopyFileA
GetModuleFileNameA
GetShortPathNameA
GetCommandLineA
HeapReAlloc
HeapSize
GetACP
user32
GetClassLongA
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
ShowWindow
SetFocus
CreateWindowExA
DestroyWindow
DefWindowProcA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetTopWindow
SetPropA
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
GetSysColorBrush
DestroyMenu
SetWindowLongA
SetWindowPos
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
GetWindowTextA
SetWindowTextA
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
ClientToScreen
LoadCursorA
GetCapture
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
EnableWindow
SetCursor
SendMessageA
PostQuitMessage
PostMessageA
wsprintfA
UnhookWindowsHookEx
LoadStringA
UnregisterClassA
gdi32
SaveDC
GetStockObject
SelectObject
SetBkColor
SetTextColor
SetViewportOrgEx
OffsetViewportOrgEx
SetMapMode
ScaleViewportExtEx
SetViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
DeleteDC
DeleteObject
GetDeviceCaps
RectVisible
TextOutA
PtVisible
Escape
ExtTextOutA
GetObjectA
CreateBitmap
RestoreDC
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyExA
RegQueryValueExA
RegEnumKeyExA
RegSetValueExA
RegOpenKeyExA
RegEnumValueA
RegDeleteKeyA
RegCloseKey
comctl32
ord17
Sections
.text Size: 76KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ogsqmka Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
eqnbfjf Size: 72KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gqnrgux Size: 4KB - Virtual size: 72KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE