Static task
static1
Behavioral task
behavioral1
Sample
3a3a233611b3e9cd400fbe6816bca8bec4ab1f7d6dac1e9e0eb1d05e3d7a12e7.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3a3a233611b3e9cd400fbe6816bca8bec4ab1f7d6dac1e9e0eb1d05e3d7a12e7.exe
Resource
win10v2004-20221111-en
General
-
Target
3a3a233611b3e9cd400fbe6816bca8bec4ab1f7d6dac1e9e0eb1d05e3d7a12e7
-
Size
616KB
-
MD5
99232ce6af4c4af3b65d04e1c96fee52
-
SHA1
9d41ca930e588454cf2208b733ece839643f1019
-
SHA256
3a3a233611b3e9cd400fbe6816bca8bec4ab1f7d6dac1e9e0eb1d05e3d7a12e7
-
SHA512
9f37dee56cbd70c75402870d23820af894fe0bc6b817855e720ae243acc0bfa55235628ac8b2fb145a9d33f15d7c614fb3bd98de665aa3ced94d9ce8f9da6ff8
-
SSDEEP
12288:yRFDmH3VkPmTdnCs/JfMy7nd2mfv8MklScNAuZt17tOhGTn1mJ:yRFDmH3VkPmbJfMyB2mXmlPAWt1xOhh
Malware Config
Signatures
Files
-
3a3a233611b3e9cd400fbe6816bca8bec4ab1f7d6dac1e9e0eb1d05e3d7a12e7.exe windows x86
74f49bbc96b9778e3e15c256504f65af
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
WritePrivateProfileStringA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
ExitProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
HeapFree
HeapAlloc
RaiseException
GetACP
GetTimeZoneInformation
SetStdHandle
GetFileType
HeapReAlloc
HeapSize
MulDiv
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetDriveTypeA
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetModuleHandleA
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
EnterCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
LocalFree
GetFullPathNameA
GetProcAddress
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
GetCurrentProcess
DuplicateHandle
GetFileTime
GetFileAttributesA
lstrcpynA
FindNextFileA
lstrcpyA
FindFirstFileA
GetLastError
SetLastError
FindClose
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
WaitForSingleObject
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GetModuleFileNameA
WinExec
GlobalLock
GlobalUnlock
GlobalAlloc
GlobalFree
GetVolumeInformationA
Sleep
GetCurrentDirectoryA
FindResourceA
LoadResource
LockResource
GetTempPathA
DeleteFileA
SizeofResource
WriteFile
LoadLibraryA
FreeLibrary
CreateFileA
CloseHandle
GetFileSize
ReadFile
user32
DrawTextA
GrayStringA
LoadCursorA
GetClassNameA
PtInRect
GetSysColorBrush
LoadStringA
DestroyMenu
SetWindowTextA
IsDialogMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
AdjustWindowRectEx
CopyRect
TabbedTextOutA
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgCtrlID
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
GetWindowTextA
CharUpperA
wsprintfA
SetFocus
UnhookWindowsHookEx
EndDialog
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GetTopWindow
ShowWindow
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
EnableWindow
LoadIconA
SetForegroundWindow
UnregisterClassA
gdi32
GetDeviceCaps
PtVisible
TextOutA
ExtTextOutA
Escape
DeleteObject
RectVisible
CreateBitmap
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
shell32
ShellExecuteA
comctl32
ord17
Sections
.text Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ