Static task
static1
Behavioral task
behavioral1
Sample
3d0efb8cdd6257e459ae080f06cc64f79a7460fe43337d4395cfbd031f6bd213.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3d0efb8cdd6257e459ae080f06cc64f79a7460fe43337d4395cfbd031f6bd213.exe
Resource
win10v2004-20220901-en
General
-
Target
3d0efb8cdd6257e459ae080f06cc64f79a7460fe43337d4395cfbd031f6bd213
-
Size
352KB
-
MD5
357d62fb870acbdcacae39a2e62fad50
-
SHA1
4f768f3c4269d239f7bc8cf8d70e761e83b98c3a
-
SHA256
3d0efb8cdd6257e459ae080f06cc64f79a7460fe43337d4395cfbd031f6bd213
-
SHA512
e56e6119e947a8b90ae931ee571322a14f87962c78eeb551b118e611f5775d9c2734a0ad7c1acd5c0b4e046ea5cc2688aa0e01f39ee1f18c997b6fc47ff4315e
-
SSDEEP
6144:w0lCDVYCwGhdKn+KE2pKX02EU0caRt3sAAJGDMRXTpn630SJZ:w0lCJYC7Kn+KEsKX01Zt8BRXTpnQ
Malware Config
Signatures
Files
-
3d0efb8cdd6257e459ae080f06cc64f79a7460fe43337d4395cfbd031f6bd213.exe windows x86
c85fbc06b88b05bc3b0516c341fa7dd6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpyA
SetFilePointer
WriteConsoleInputA
GetComPlusPackageInstallStatus
GetModuleHandleA
FindResourceExW
WriteConsoleOutputAttribute
VerifyVersionInfoA
IsDebuggerPresent
VirtualFree
OpenWaitableTimerA
GetTempPathA
WaitNamedPipeA
SetEndOfFile
GlobalAddAtomA
VerifyVersionInfoA
FileTimeToSystemTime
IsValidCodePage
GetModuleFileNameA
OpenSemaphoreA
EndUpdateResourceA
EnumSystemLanguageGroupsA
GlobalFindAtomA
GetVolumePathNamesForVolumeNameA
GetSystemWindowsDirectoryA
VirtualAllocEx
WriteProcessMemory
GetCommTimeouts
FillConsoleOutputAttribute
SetLocalTime
GetDefaultCommConfigA
ReadConsoleOutputAttribute
LZRead
UnlockFile
FindResourceA
FlushConsoleInputBuffer
SystemTimeToFileTime
GetCommandLineA
GetSystemInfo
EnumUILanguagesA
WriteProfileSectionA
GetDefaultCommConfigA
FindFirstFileExA
FormatMessageA
Heap32ListFirst
_lread
LoadLibraryExW
LocalUnlock
RequestDeviceWakeup
DeleteTimerQueue
SetConsoleTitleA
SetUnhandledExceptionFilter
SetLocaleInfoA
MoveFileExW
MoveFileWithProgressA
GetCurrentConsoleFont
SetConsoleWindowInfo
GetTickCount
EnumSystemCodePagesA
ReleaseSemaphore
GetLogicalDriveStringsA
WaitCommEvent
GetVersionExA
CreateSocketHandle
OpenFile
OpenFileMappingA
FindFirstFileExW
_lclose
SetConsoleCursor
GetPrivateProfileSectionNamesA
GetThreadPriority
GetFileAttributesExA
GetDriveTypeA
GetCPInfoExA
GetDiskFreeSpaceA
lstrlenA
GetCurrentProcessId
GetDevicePowerState
GetThreadLocale
OpenWaitableTimerA
CloseHandle
GetProcessHandleCount
GetSystemTimeAsFileTime
CancelWaitableTimer
GetConsoleOutputCP
SetConsoleScreenBufferSize
WriteConsoleInputA
GetBinaryTypeA
GetComputerNameExA
GetPrivateProfileSectionA
MultiByteToWideChar
SetFileApisToANSI
ReadConsoleOutputA
RaiseException
GetFileInformationByHandle
UnregisterWaitEx
GetFileSizeEx
RaiseException
LoadModule
SetCalendarInfoA
ReadConsoleOutputAttribute
GetProcessId
GetTapeParameters
SetDllDirectoryA
ConvertDefaultLocale
GetCommandLineA
WritePrivateProfileStructA
FreeEnvironmentStringsA
SetLastError
GetNumberFormatA
SetFileApisToOEM
ReplaceFile
SetFileAttributesA
GlobalUnfix
ChangeTimerQueueTimer
SetDllDirectoryA
DeleteTimerQueue
GetDevicePowerState
GetCompressedFileSizeA
CreateWaitableTimerA
DuplicateHandle
DeleteFileA
GetVolumeInformationA
ReadConsoleA
SearchPathA
GetCurrentDirectoryA
CloseHandle
ClearCommBreak
CreateSemaphoreA
GetLogicalDriveStringsA
OpenFileMappingA
GetCommandLineA
ExitProcess
SetCalendarInfoA
QueryDosDeviceA
RequestWakeupLatency
WriteConsoleOutputCharacterA
GetLogicalDriveStringsA
GetFullPathNameA
GetThreadContext
GetComputerNameA
AddAtomA
GlobalMemoryStatusEx
Toolhelp32ReadProcessMemory
GetProcessTimes
SetThreadUILanguage
GetFileAttributesExA
BuildCommDCBA
TransmitCommChar
GetCompressedFileSizeA
WaitForSingleObject
GetSystemTime
GetVersionExA
IsBadReadPtr
RegisterWaitForInputIdle
DuplicateHandle
GetCommandLineA
GetConsoleHardwareState
SetConsoleCtrlHandler
ReleaseMutex
FindFirstVolumeMountPointW
RaiseException
OpenJobObjectA
GetConsoleTitleA
GetFileAttributesExA
SetThreadAffinityMask
FindFirstVolumeMountPointA
lstrcpynA
GetSystemDirectoryA
user32
CopyAcceleratorTableA
LoadImageA
EnterReaderModeHelper
GetClipboardFormatNameA
OpenInputDesktop
IsWindow
CreateDialogParamA
SetMenuInfo
GetClassInfoExW
DrawFocusRect
GetWindowDC
SetMenuDefaultItem
ChangeDisplaySettingsExA
GetAppCompatFlags
GetPropA
GetWindowTextA
GetRawInputDeviceInfoA
CloseWindow
GetKeyState
GetUpdateRect
SetCapture
SetForegroundWindow
TabbedTextOutA
ChangeMenuA
GetClipboardViewer
PrivateExtractIconsA
LoadIconA
SetDlgItemInt
DispatchMessageA
LockWindowUpdate
GetIconInfo
IsDialogMessageA
GetNextDlgGroupItem
PrivateExtractIconExA
SetTaskmanWindow
CharPrevExA
DrawFrameControl
EnumDisplaySettingsA
OffsetRect
LockWindowUpdate
BroadcastSystemMessageExA
GetClassInfoExA
UnhookWindowsHook
GetProcessDefaultLayout
OemToCharA
CallMsgFilterA
DrawIcon
ModifyMenuA
IsDialogMessageA
GetUpdateRgn
GetMessageTime
RegisterClassExW
SetDoubleClickTime
AnyPopup
CreateSystemThreads
AttachThreadInput
CallMsgFilterA
OffsetRect
CharToOemBuffW
GetDCEx
CopyRect
IsCharUpperA
ModifyMenuA
SetProgmanWindow
GetKeyboardType
GetCapture
IsChild
SetCapture
IsDialogMessage
UnionRect
EndMenu
SwitchDesktop
SetSysColors
GetMonitorInfoA
LockWorkStation
CreateIconFromResource
EmptyClipboard
SetPropA
CopyRect
SetProcessWindowStation
PrivateExtractIconsA
CreateDialogParamA
ChildWindowFromPoint
DrawMenuBarTemp
LockSetForegroundWindow
SetWindowTextA
CloseDesktop
MessageBoxTimeoutA
SetWindowTextA
GetMessageA
advapi32
DuplicateToken
Sections
.itext Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 188KB - Virtual size: 453KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ