Static task
static1
Behavioral task
behavioral1
Sample
3889647e805038291484fdcbeedff28756b632c56f0e3fd91c11f123423a9c3a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3889647e805038291484fdcbeedff28756b632c56f0e3fd91c11f123423a9c3a.exe
Resource
win10v2004-20220901-en
General
-
Target
3889647e805038291484fdcbeedff28756b632c56f0e3fd91c11f123423a9c3a
-
Size
232KB
-
MD5
151c8b335484b4f99ebba6c1ab1c400c
-
SHA1
bf6ed39db69b7691d30706ca8e0411bc009a49cd
-
SHA256
3889647e805038291484fdcbeedff28756b632c56f0e3fd91c11f123423a9c3a
-
SHA512
c1563b286841eb87bd1f84502a1dd9713b6425b43a0ac6266c4a867e012ca955c280ddc9c23b6648733db387c567024c6799b777157494aa60c28519cc4598e3
-
SSDEEP
6144:tHrnR2l+o+APC1BQLHgXvLIw0uiNNfYSyM2FqRHmZQcox:tHMl+dAOQEIwSNfYNM2F5ZZox
Malware Config
Signatures
Files
-
3889647e805038291484fdcbeedff28756b632c56f0e3fd91c11f123423a9c3a.exe windows x86
534f77e599d985b1c95baef0880d543a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenSemaphoreA
lstrcmp
CreateSemaphoreA
SetCurrentDirectoryW
lstrcpyA
GetThreadPriority
BeginUpdateResourceW
Beep
lstrlen
ReadDirectoryChangesW
OpenWaitableTimerW
GetSystemInfo
IsBadReadPtr
ConnectNamedPipe
GetProcAddress
GetComputerNameA
FindResourceA
lstrcmpi
GetModuleHandleW
GetNamedPipeInfo
GetLocalTime
lstrcpy
LocalAlloc
Sleep
GetVersionExA
GetThreadLocale
OpenEventA
SetComputerNameA
GetCurrentThreadId
GetProcessHeap
FileTimeToDosDateTime
OpenProcess
WaitForSingleObject
GetCalendarInfoW
CreateEventA
lstrcpyW
InitializeCriticalSection
OpenWaitableTimerA
GetTimeFormatW
GetVersion
EnumDateFormatsW
EnumTimeFormatsW
CreateDirectoryA
lstrlenA
user32
GetWindowRgn
LoadBitmapA
OpenClipboard
RegisterClassW
InvalidateRgn
GetDC
WinHelpW
SetDlgItemInt
CreateDesktopW
OffsetRect
DefDlgProcA
CreateDialogParamW
gdi32
SelectClipPath
OffsetViewportOrgEx
EnumFontFamiliesW
SetTextCharacterExtra
SetROP2
GetCurrentPositionEx
GetDeviceCaps
SetWindowOrgEx
GetTextExtentExPointI
EnumFontFamiliesExW
PlayEnhMetaFile
StrokePath
GetCharacterPlacementW
EnumFontFamiliesExA
StartFormPage
advapi32
RegEnumValueW
RegSaveKeyA
RegCreateKeyA
shell32
SHGetFileInfoA
shlwapi
SHGetValueA
comdlg32
PageSetupDlgA
PageSetupDlgW
PrintDlgExA
GetFileTitleW
GetOpenFileNameA
oleaut32
SysAllocString
VarUI8FromDec
VarBoolFromUI1
opengl32
glLighti
glRasterPos3dv
glGetTexImage
sqlunirl
_CreateService_@52
_ExtTextOut@32
_BeginUpdateResource_@8
_lstrcpyn_@12
_DefFrameProc_@20
_LookupPrivilegeName_@16
_DragQueryFile_@16
_CallWindowProc@20
_MapVirtualKey_@8
_SetFileSecurity_@12
_AddFontResource_@4
_GetDlgItemText@16
_RegOpenKeyEx_@20
_GetMenuString_@20
_CreateNamedPipe_@32
crypt32
PFXExportCertStoreEx
CryptSignAndEncryptMessage
CryptRegisterOIDFunction
RegCreateKeyExU
I_CryptInsertLruEntry
CertFindSubjectInSortedCTL
CryptVerifyMessageSignature
CertIsValidCRLForCertificate
CertRDNValueToStrW
CertDuplicateCertificateChain
CertVerifyValidityNesting
CertGetEnhancedKeyUsage
CryptGetAsyncParam
CryptMsgUpdate
CertGetCRLFromStore
CertOpenStore
I_CryptGetFileVersion
I_CryptReleaseLruEntry
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.WTXOa Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cJ Size: 512B - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.S Size: 2KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Lx Size: 4KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.E Size: 2KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.AIA Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vtdk Size: 1KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.flYp Size: 1024B - Virtual size: 321KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 230KB - Virtual size: 230KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ