Static task
static1
Behavioral task
behavioral1
Sample
3d0aea9fb57315e0906f80c039c049cc1d5a66f2812f6cf4f8817bdb61204132.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3d0aea9fb57315e0906f80c039c049cc1d5a66f2812f6cf4f8817bdb61204132.exe
Resource
win10v2004-20220812-en
General
-
Target
3d0aea9fb57315e0906f80c039c049cc1d5a66f2812f6cf4f8817bdb61204132
-
Size
180KB
-
MD5
af7100111133e3e45e9914333a0a19ae
-
SHA1
aaf0a1636e49d7ace34a31f070babc2f031a63ed
-
SHA256
3d0aea9fb57315e0906f80c039c049cc1d5a66f2812f6cf4f8817bdb61204132
-
SHA512
d76fc050fbe37949128f01214991dd16adf4ac209c97ebf71a6a70e3c7ccacb10f4f2bd8ff5ff9f348c47a514ed9817ee657a81b11b1cf3006e30c3bf71bc1d0
-
SSDEEP
3072:LexmlEXWV0J4k8Xf5bzMnY4TpO1eWiG4jqzmyoYS27DFtf0n20Y:LexmlEXWV0J4k8PSOUWTlZ5H0n2
Malware Config
Signatures
Files
-
3d0aea9fb57315e0906f80c039c049cc1d5a66f2812f6cf4f8817bdb61204132.exe windows x86
a2126e98cfbf87683373df8f86c0bb62
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FileTimeToLocalFileTime
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
ExitProcess
GetStartupInfoA
GetCommandLineA
SetStdHandle
GetFileType
RaiseException
HeapSize
GetACP
GetTimeZoneInformation
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
HeapDestroy
VirtualFree
FileTimeToSystemTime
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetDriveTypeA
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetFileTime
GetFileSize
GetFullPathNameA
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
DuplicateHandle
GetProcessVersion
GetVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetCurrentDirectoryA
lstrcatA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
GlobalFree
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
lstrcpynA
lstrcpyA
SetLastError
FormatMessageA
WaitForSingleObject
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
FreeLibrary
GetCurrentThreadId
MultiByteToWideChar
lstrlenA
InterlockedDecrement
InterlockedIncrement
WideCharToMultiByte
GlobalAlloc
GlobalLock
GlobalUnlock
GetCurrentProcess
FindFirstFileA
FindNextFileA
FindClose
GetModuleHandleA
CreateToolhelp32Snapshot
Process32First
GetCurrentProcessId
OpenProcess
TerminateProcess
CloseHandle
Process32Next
HeapCreate
HeapAlloc
HeapReAlloc
HeapFree
GetLastError
LocalAlloc
LocalFree
GetVersionExA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetModuleFileNameA
OutputDebugStringA
SetFileAttributesA
DeleteFileA
RemoveDirectoryA
CopyFileA
GetFileAttributesA
Sleep
LoadLibraryA
GetProcAddress
VirtualAlloc
user32
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetTopWindow
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
GetSysColorBrush
CharUpperA
DestroyMenu
SystemParametersInfoA
IsIconic
GetWindowPlacement
ShowWindow
SetWindowPos
SetWindowLongA
GrayStringA
DrawTextA
TabbedTextOutA
GetClassLongA
wsprintfA
GetWindowTextA
SetWindowTextA
GetWindow
GetDlgCtrlID
PtInRect
GetClassNameA
ClientToScreen
LoadCursorA
LoadStringA
UnhookWindowsHookEx
SetFocus
GetSystemMetrics
DestroyWindow
GetDlgItem
CopyRect
GetClientRect
GetDC
ReleaseDC
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
CreateWindowExA
EnableWindow
SetCursor
PostQuitMessage
PostMessageA
RegisterWindowMessageA
GetWindowRect
SendMessageA
PeekMessageA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
GetMenuItemCount
SetForegroundWindow
GetMessageA
TranslateMessage
DispatchMessageA
GetCapture
UnregisterClassA
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
SetMapMode
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SetTextColor
SetBkColor
GetStockObject
RestoreDC
SaveDC
CreateBitmap
GetObjectA
SelectObject
DeleteObject
DeleteDC
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
RegCloseKey
RegCreateKeyA
RegQueryValueExA
RegCreateKeyExA
RegDeleteKeyA
RegGetKeySecurity
RegSetKeySecurity
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteValueA
RegSetValueExA
shell32
SHGetSpecialFolderPathA
comctl32
ord17
ole32
CoTaskMemFree
CoInitialize
url
InetIsOffline
wininet
InternetGetLastResponseInfoA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetReadFile
InternetQueryDataAvailable
Sections
.text Size: 120KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ