Static task
static1
Behavioral task
behavioral1
Sample
3f7c381430dff05d71bee4844bfaf60e6921cf5f4c495344f6ee6cf714d4a71a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3f7c381430dff05d71bee4844bfaf60e6921cf5f4c495344f6ee6cf714d4a71a.exe
Resource
win10v2004-20220901-en
General
-
Target
3f7c381430dff05d71bee4844bfaf60e6921cf5f4c495344f6ee6cf714d4a71a
-
Size
819KB
-
MD5
5078491b0d6680017baaad57c0cf5ed0
-
SHA1
07e5f7e7b09008ed134598f168a8f283d7960392
-
SHA256
3f7c381430dff05d71bee4844bfaf60e6921cf5f4c495344f6ee6cf714d4a71a
-
SHA512
52841172255dc7f7b39ceb6b1bdd1fb1a53301e73b43cd775130b097d6a6080210812978c46d502f3172566358e0f3f0ae78d12fe7627578692d49786a7516b4
-
SSDEEP
24576:lC8+aadorIZZRBQ0tsrWGWIIUifF1TGZIw:lC8c3Q0t0W5rLGZIw
Malware Config
Signatures
Files
-
3f7c381430dff05d71bee4844bfaf60e6921cf5f4c495344f6ee6cf714d4a71a.exe windows x86
0957a8ca1e1000e1d8b75bb5d5da8edd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeResource
GetWindowsDirectoryA
QueryPerformanceCounter
SetEnvironmentVariableA
CreateFileA
GetEnvironmentStrings
CompareStringA
FlushFileBuffers
RtlUnwind
GetSystemInfo
VirtualAlloc
GetConsoleMode
InterlockedExchange
HeapAlloc
GlobalFlags
LocalAlloc
FindClose
HeapSize
GetVersionExA
IsDebuggerPresent
LoadResource
GetCurrentThreadId
ReadFile
GlobalAlloc
Sleep
GetModuleFileNameA
lstrlenA
TlsFree
VirtualProtect
GetCommandLineA
GlobalHandle
FileTimeToSystemTime
GetVersion
SetStdHandle
TlsSetValue
GetCurrentThread
LockFile
GetFileSize
LocalFree
GetSystemTimeAsFileTime
GetFileTime
GetCommandLineW
VirtualFree
GlobalLock
GetACP
GetThreadLocale
CloseHandle
LockResource
lstrcmpA
SetHandleCount
GetFileType
SizeofResource
DeleteCriticalSection
HeapFree
SetLastError
MulDiv
GetConsoleCP
LocalReAlloc
HeapCreate
GetLastError
TlsAlloc
SetFilePointer
GetStringTypeA
GetProcessHeap
GetLocaleInfoA
LeaveCriticalSection
WriteFile
FileTimeToLocalFileTime
LocalFileTimeToFileTime
SetErrorMode
ExitProcess
RaiseException
FreeEnvironmentStringsA
InterlockedDecrement
HeapReAlloc
EnterCriticalSection
VirtualQuery
GlobalUnlock
InterlockedIncrement
DuplicateHandle
GetStdHandle
GetTimeZoneInformation
TlsGetValue
SetFileTime
GlobalDeleteAtom
UnlockFile
InitializeCriticalSection
UnhandledExceptionFilter
TerminateProcess
FreeLibrary
ConvertDefaultLocale
LCMapStringA
HeapDestroy
GlobalFree
SetEndOfFile
GlobalReAlloc
GetConsoleOutputCP
SetUnhandledExceptionFilter
LoadLibraryA
GetCurrentProcessId
EnumResourceLanguagesW
GetSystemDirectoryA
SystemTimeToFileTime
LoadLibraryExA
GetModuleHandleA
GetOEMCP
FindAtomA
AddAtomA
WriteConsoleA
GetProcAddress
FreeConsole
ReadConsoleInputA
GetTickCount
GetStartupInfoA
AllocConsole
user32
GetLastActivePopup
GetMenu
WindowFromPoint
BeginPaint
SetScrollInfo
LockWindowUpdate
SetScrollRange
SystemParametersInfoA
SetCapture
DeferWindowPos
IsIconic
GetMessageTime
GetWindowPlacement
IsWindowVisible
GetDlgItem
SetActiveWindow
GetDCEx
GetSysColor
AdjustWindowRectEx
PostQuitMessage
ReleaseCapture
InvalidateRect
GetWindowDC
GetKeyState
BringWindowToTop
UnpackDDElParam
UnhookWindowsHookEx
GetMenuItemCount
EndDeferWindowPos
EnableMenuItem
IntersectRect
KillTimer
GetNextDlgTabItem
ShowScrollBar
GetMenuState
GetSystemMetrics
ReleaseDC
ClientToScreen
SetRect
MapWindowPoints
CopyRect
SetFocus
GetCursorPos
ValidateRect
ReuseDDElParam
GetDC
EndPaint
MapDialogRect
DrawIcon
SetMenu
IsWindow
SetWindowContextHelpId
SetTimer
ShowWindow
SetRectEmpty
IsZoomed
PtInRect
GetScrollInfo
GetMessagePos
SetParent
IsWindowEnabled
OffsetRect
GetWindowRect
TrackPopupMenu
InvalidateRgn
GetSystemMenu
SetWindowPos
GetWindowRgn
GetScrollPos
DeleteMenu
GetFocus
UpdateWindow
InflateRect
GetCapture
SetScrollPos
DestroyMenu
IsChild
SetCursor
MessageBeep
GetMenuCheckMarkDimensions
MoveWindow
UnregisterClassA
SetMenuItemBitmaps
GetClientRect
GetSubMenu
GetWindowThreadProcessId
CheckMenuItem
IsRectEmpty
GetParent
BeginDeferWindowPos
GetDlgCtrlID
SetForegroundWindow
ScreenToClient
TranslateMessage
DestroyIcon
EqualRect
GetNextDlgGroupItem
SendDlgItemMessageA
CreatePopupMenu
ScrollWindow
GetScrollRange
GetDesktopWindow
GetTopWindow
DestroyWindow
GetForegroundWindow
FillRect
GetWindow
CallNextHookEx
ShowOwnedPopups
GetMenuItemID
GetSysColorBrush
GetActiveWindow
RedrawWindow
EndDialog
SetWindowRgn
gdi32
GetMapMode
CreateSolidBrush
GetRgnBox
BitBlt
ExcludeClipRect
CreateBitmap
IntersectClipRect
OffsetRgn
GetWindowExtEx
GetDeviceCaps
SetViewportExtEx
CreatePatternBrush
CreateRectRgn
SelectObject
Ellipse
DeleteObject
SetRectRgn
ExtSelectClipRgn
DeleteDC
StretchDIBits
SetTextColor
SaveDC
CreateCompatibleDC
PatBlt
SelectClipRgn
GetPixel
OffsetViewportOrgEx
CombineRgn
CreateEllipticRgn
SetMapMode
CreateCompatibleBitmap
SetBkMode
GetStockObject
GetTextColor
ScaleViewportExtEx
SetWindowExtEx
PtVisible
RestoreDC
GetClipBox
RectVisible
SetViewportOrgEx
CreateRectRgnIndirect
GetBkColor
SetBkColor
DPtoLP
Escape
ScaleWindowExtEx
advapi32
SetFileSecurityW
RegCloseKey
shell32
DragAcceptFiles
DragFinish
ole32
CoRegisterMessageFilter
CreateStreamOnHGlobal
CreateILockBytesOnHGlobal
CoCreateInstance
OleInitialize
CLSIDFromString
StgCreateDocfileOnILockBytes
CoRevokeClassObject
CoFreeUnusedLibraries
OleUninitialize
CLSIDFromProgID
CoTaskMemFree
StgOpenStorageOnILockBytes
OleFlushClipboard
CoGetClassObject
CoTaskMemAlloc
OleIsCurrentClipboard
oleaut32
VariantChangeType
OleCreateFontIndirect
OleLoadPicture
SafeArrayDestroy
SysAllocString
VariantInit
VariantCopy
VariantClear
SystemTimeToVariantTime
VariantTimeToSystemTime
SysAllocStringLen
SysStringLen
SysFreeString
comctl32
ImageList_LoadImageW
shlwapi
PathStripToRootW
PathIsUNCW
PathFindFileNameW
PathRemoveExtensionW
PathFindExtensionW
PathFileExistsW
wldap32
ord201
Sections
.text Size: 640KB - Virtual size: 639KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 153KB - Virtual size: 5.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 101B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ