Static task
static1
Behavioral task
behavioral1
Sample
a3b1e5b3b53fb97a8e7af7e707c3e317c4ed20458b040e52784da0a53667f2c7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a3b1e5b3b53fb97a8e7af7e707c3e317c4ed20458b040e52784da0a53667f2c7.exe
Resource
win10v2004-20221111-en
General
-
Target
a3b1e5b3b53fb97a8e7af7e707c3e317c4ed20458b040e52784da0a53667f2c7
-
Size
115KB
-
MD5
367606c7287e0ebe2079952055d5c344
-
SHA1
73c1b4c07d3f729cf8ca71d6b8c222143edb8daa
-
SHA256
a3b1e5b3b53fb97a8e7af7e707c3e317c4ed20458b040e52784da0a53667f2c7
-
SHA512
911d698f08995fe5fa46ed96ae051062726227daaf8e388d9a862f2d9fcdb97273951c4b5a48f8937f8328b284f10607fca1a013ba38ffc38220850da740dc70
-
SSDEEP
3072:YmpEp9xUWu1gGjXr2vwvEbMps2i/XHCo8:YmpPTj7QIpsPa
Malware Config
Signatures
Files
-
a3b1e5b3b53fb97a8e7af7e707c3e317c4ed20458b040e52784da0a53667f2c7.exe windows x86
34189d522d9c31eeba7932abd1253947
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetFileTitleA
GetSaveFileNameA
version
GetFileVersionInfoSizeA
VerFindFileA
kernel32
GetStringTypeW
ExitThread
SetEvent
GetModuleFileNameA
GetProcAddress
GetStdHandle
lstrcpyA
GlobalDeleteAtom
GetCurrentThreadId
VirtualAllocEx
SizeofResource
DeleteCriticalSection
GetModuleHandleA
GetUserDefaultLCID
comctl32
ImageList_Write
ImageList_DrawEx
ImageList_Remove
ImageList_Add
ImageList_GetBkColor
ImageList_DragShowNolock
ImageList_Destroy
ImageList_Read
ImageList_Draw
ole32
CoRevokeClassObject
CoGetMalloc
CoUnmarshalInterface
CreateOleAdviseHolder
gdi32
LineTo
SetBkColor
GetDIBColorTable
CreateBitmap
GetDIBits
CopyEnhMetaFileA
CreatePenIndirect
GetPixel
CreatePalette
GetPaletteEntries
advapi32
RegQueryInfoKeyA
RegLoadKeyA
RegQueryValueExA
user32
DrawIconEx
SetScrollRange
SetCapture
EndPaint
ClientToScreen
EnableWindow
GetWindowPlacement
AdjustWindowRectEx
PostQuitMessage
KillTimer
DestroyWindow
OffsetRect
GetMessagePos
GetKeyboardLayoutList
GetTopWindow
EnumThreadWindows
GetSubMenu
DispatchMessageW
GetKeyboardState
SetPropA
CloseClipboard
RemovePropA
LoadCursorA
MapVirtualKeyA
MsgWaitForMultipleObjects
GetCursor
LoadIconA
oleaut32
SafeArrayCreate
SysStringLen
SafeArrayPtrOfIndex
VariantCopyInd
VariantChangeType
SysFreeString
SafeArrayGetElement
SafeArrayGetUBound
SysAllocStringLen
RegisterTypeLib
shell32
SHGetFolderPathA
SHGetDesktopFolder
SHGetFileInfoA
SHGetSpecialFolderLocation
SHFileOperationA
shlwapi
PathIsContentTypeA
SHGetValueA
SHQueryValueExA
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.edata Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ