Static task
static1
Behavioral task
behavioral1
Sample
3dd7eafbb43430c4974e099f5d52355ec901d06b55e07ae7a6491c002c2572a5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3dd7eafbb43430c4974e099f5d52355ec901d06b55e07ae7a6491c002c2572a5.exe
Resource
win10v2004-20220901-en
General
-
Target
3dd7eafbb43430c4974e099f5d52355ec901d06b55e07ae7a6491c002c2572a5
-
Size
287KB
-
MD5
34439172e14201f72f0113325a244570
-
SHA1
8a31b4b06a4e818fe93539ba1e2fd7f37981e37e
-
SHA256
3dd7eafbb43430c4974e099f5d52355ec901d06b55e07ae7a6491c002c2572a5
-
SHA512
462b0f3e3a13a8309a091e4d62c312c86dafb4bad6456ae67dac7598d2ea5e6477eedc1e2c4051d5c49248316d4ec35d3e319146e3a478d24a70eb8b7ebb86ff
-
SSDEEP
6144:nG0sqxNHKJcQvepAxNabfpL7NkR7mJhhy2sXApHxZMMr:nGyxIJ/WgN4YRasQl/
Malware Config
Signatures
Files
-
3dd7eafbb43430c4974e099f5d52355ec901d06b55e07ae7a6491c002c2572a5.exe windows x86
6b243ebcdedc9bab1c5d4df59e58ecf5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
CommDlgExtendedError
FindTextA
ChooseFontW
GetFileTitleA
ChooseFontA
GetSaveFileNameA
ChooseColorA
GetOpenFileNameA
GetSaveFileNameW
kernel32
QueryPerformanceCounter
ExpandEnvironmentStringsA
VirtualProtect
FreeResource
LocalFree
GetOEMCP
GlobalGetAtomNameA
lstrcmpA
RtlUnwind
SetThreadPriority
VirtualAlloc
SetLastError
GetCurrentProcessId
SetFileAttributesA
GetDateFormatA
ResetEvent
ReadProcessMemory
TlsSetValue
LCMapStringA
lstrcmpW
SetFileTime
HeapDestroy
GetSystemDirectoryA
LocalAlloc
FindClose
GetModuleHandleA
SetPriorityClass
FindFirstFileW
CompareFileTime
IsValidLocale
HeapSize
GetStringTypeW
GetVersion
SystemTimeToFileTime
HeapReAlloc
EnterCriticalSection
GetTickCount
GetModuleFileNameA
FileTimeToSystemTime
GetThreadLocale
GlobalFree
OutputDebugStringA
GetVolumeInformationA
InterlockedDecrement
GetDriveTypeA
InterlockedCompareExchange
GlobalAddAtomA
GetSystemInfo
GetCurrentThreadId
GetEnvironmentStrings
CloseHandle
RaiseException
GetProcessHeap
FileTimeToLocalFileTime
GetCurrentThread
GlobalFindAtomA
GetProcessVersion
MoveFileA
SetErrorMode
LockFile
SetUnhandledExceptionFilter
GetCommandLineA
GetTimeFormatA
GetProfileStringA
Sleep
GetExitCodeThread
GetStdHandle
IsBadReadPtr
FatalAppExitA
InitializeCriticalSection
GetEnvironmentStringsW
GetCurrentProcess
DeleteFileA
GetTempFileNameA
GlobalReAlloc
GetUserDefaultLCID
GetSystemDirectoryW
MapViewOfFile
SetFileAttributesW
GetProcAddress
GlobalFlags
HeapAlloc
InterlockedIncrement
GetVersionExA
SetStdHandle
VirtualFree
RemoveDirectoryW
GetFullPathNameA
SizeofResource
GetWindowsDirectoryA
GetTimeZoneInformation
lstrcatA
GetConsoleCP
GetShortPathNameA
GetCommandLineW
SetConsoleCtrlHandler
LocalLock
GetLocaleInfoW
IsDebuggerPresent
SearchPathA
MoveFileW
SetEndOfFile
GetFileSize
SetEvent
CompareStringA
DebugBreak
GetModuleHandleW
GlobalDeleteAtom
CreateFileMappingW
ReadFile
OpenMutexA
ExitProcess
FindResourceW
GetFileAttributesA
DeleteCriticalSection
GetFileAttributesW
MulDiv
GetCurrentDirectoryA
CopyFileA
TerminateThread
GetLocalTime
LCMapStringW
CompareStringW
DeleteFileW
lstrcpyA
HeapFree
GetStartupInfoA
IsBadWritePtr
GetLocaleInfoA
WaitForSingleObject
GetConsoleOutputCP
lstrcpyW
CreateDirectoryA
lstrlenA
TlsFree
GetWindowsDirectoryW
UnhandledExceptionFilter
WriteConsoleW
LoadLibraryA
IsBadStringPtrA
GetModuleFileNameW
CreateFileA
SetCurrentDirectoryW
FreeEnvironmentStringsW
WideCharToMultiByte
VirtualQuery
ResumeThread
GetFileType
LeaveCriticalSection
CreateProcessA
WinExec
FreeEnvironmentStringsA
lstrcpynA
MultiByteToWideChar
WriteFile
InterlockedExchange
HeapCreate
lstrcmpiA
FreeLibrary
CreateMutexA
GetLogicalDriveStringsW
GlobalLock
TerminateProcess
WritePrivateProfileStringA
UnlockFile
HeapValidate
FindFirstFileA
GetEnvironmentVariableA
GetNumberFormatA
GetStringTypeA
_lclose
CreateSemaphoreA
LocalReAlloc
EnumResourceLanguagesA
GetStartupInfoW
ReleaseSemaphore
GlobalUnlock
LoadResource
GetTempPathA
GetLastError
GetProfileIntA
EnumSystemLocalesA
GetFileTime
SetEnvironmentVariableA
lstrlenW
SetFilePointer
GetACP
WriteProcessMemory
TlsAlloc
GetDiskFreeSpaceA
IsValidCodePage
GetSystemTimeAsFileTime
SetFilePointerEx
CreateThread
GlobalHandle
ConvertDefaultLocale
PeekNamedPipe
CreateEventA
TlsGetValue
GetCPInfo
FlushFileBuffers
_llseek
SetHandleCount
user32
GetDlgCtrlID
SetRectEmpty
GetMessageA
CreateDialogIndirectParamA
IsIconic
GetSubMenu
DispatchMessageA
GetDlgItem
CreateMenu
FillRect
EnableMenuItem
TranslateMessage
AppendMenuA
LoadIconA
SetMenuItemBitmaps
GetWindowTextW
LoadStringW
UpdateWindow
GetMonitorInfoW
IsWindow
IntersectRect
GetNextDlgGroupItem
FrameRect
DrawTextExA
GetScrollPos
RegisterClipboardFormatW
TabbedTextOutA
GetAsyncKeyState
DrawIconEx
GetWindowThreadProcessId
DispatchMessageW
PostQuitMessage
SetFocus
GetClassInfoExA
PeekMessageW
SetWindowLongA
ShowCursor
IsDialogMessageA
GetKeyboardState
GetMessageW
LoadIconW
DrawMenuBar
SetWindowPos
SendNotifyMessageA
wsprintfA
MapWindowPoints
HideCaret
DestroyMenu
OemToCharBuffA
ScrollWindow
GetClassInfoA
CharNextA
EnableWindow
MessageBeep
KillTimer
MapVirtualKeyA
DeferWindowPos
IsMenu
GetWindowRgn
GetNextDlgTabItem
GetDesktopWindow
ExitWindowsEx
CallWindowProcA
UnpackDDElParam
SetClipboardData
GetClassLongA
IsClipboardFormatAvailable
BeginPaint
DrawFocusRect
GetMenuState
SetMenuDefaultItem
GetSystemMenu
AttachThreadInput
LoadCursorW
ReleaseDC
ScreenToClient
IsRectEmpty
RegisterClassA
DefWindowProcW
SetWindowTextA
DrawTextW
GetMenu
WinHelpA
EndPaint
RedrawWindow
CheckRadioButton
GetMenuItemInfoW
DrawTextA
SetCursorPos
CopyIcon
GetDC
CharLowerA
MonitorFromPoint
GetMessageTime
EqualRect
MessageBoxA
GetSystemMetrics
GetSysColorBrush
InvalidateRect
GetWindowRect
DestroyCursor
EndDialog
GetWindowDC
IsChild
DefDlgProcA
GetWindowTextLengthW
SetWindowPlacement
DrawEdge
ModifyMenuW
GetTabbedTextExtentA
LoadAcceleratorsW
GetKeyState
SetWindowRgn
UnregisterClassW
RegisterClipboardFormatA
SetClassLongA
GetWindowTextA
SetDlgItemTextA
RegisterClassExA
UnregisterClassA
CreateWindowExW
GetSysColor
DrawTextExW
SendDlgItemMessageA
GetMenuItemID
SetWindowContextHelpId
CopyImage
AppendMenuW
SetRect
CopyRect
WaitMessage
SetMenuItemInfoA
GetWindow
IsCharLowerA
PostMessageA
SetDlgItemTextW
CheckMenuItem
GetPropA
SetTimer
SetScrollRange
DrawIcon
GetCursorPos
RemovePropW
OemToCharA
SetScrollPos
GrayStringA
BringWindowToTop
IsDlgButtonChecked
OffsetRect
GetWindowTextLengthA
SetCursor
GetClientRect
SetPropA
GetClassNameA
SetScrollInfo
ChildWindowFromPoint
MoveWindow
SystemParametersInfoA
OpenClipboard
DrawFrameControl
SetWindowLongW
ModifyMenuA
DrawStateW
CharLowerW
ScrollDC
ValidateRect
ExcludeUpdateRgn
CharUpperW
MessageBoxW
GetMenuCheckMarkDimensions
InflateRect
CreatePopupMenu
GetScrollInfo
GetMenuItemCount
LoadCursorA
InSendMessage
IsWindowVisible
IsWindowEnabled
TranslateMDISysAccel
SendMessageA
IsCharAlphaNumericA
GetPropW
GetDCEx
PeekMessageA
ShowCaret
RegisterWindowMessageA
SetForegroundWindow
LoadImageW
LoadMenuA
SetWindowTextW
CloseClipboard
MsgWaitForMultipleObjects
ReleaseCapture
GetForegroundWindow
GetDialogBaseUnits
GetMenuItemInfoA
FindWindowA
PtInRect
GetTopWindow
WinHelpW
CharUpperA
DialogBoxIndirectParamA
DefWindowProcA
GetWindowLongA
GetParent
GetFocus
GetActiveWindow
CreateWindowExA
CopyAcceleratorTableA
GetKeyNameTextA
TrackPopupMenu
CallNextHookEx
LoadImageA
MapDialogRect
GetCapture
PostMessageW
InsertMenuW
ShowWindow
DdeCreateStringHandleA
GetMessagePos
GetWindowPlacement
DeleteMenu
SetCapture
GetLastActivePopup
WindowFromPoint
SetWindowsHookExA
DestroyWindow
SendMessageTimeoutW
LoadBitmapA
ClientToScreen
UnhookWindowsHookEx
PostThreadMessageA
ShowOwnedPopups
InvalidateRgn
DestroyIcon
DialogBoxParamW
GetIconInfo
EnableScrollBar
InsertMenuA
LockWindowUpdate
EnumWindows
RegisterClassW
DdeFreeStringHandle
SetActiveWindow
ole32
OleFlushClipboard
CoLockObjectExternal
CoGetMalloc
OleQueryCreateFromData
RegisterDragDrop
OleQueryLinkFromData
RevokeDragDrop
GetClassFile
CoRegisterMessageFilter
CoInitialize
OleInitialize
CoFreeUnusedLibraries
OleIsCurrentClipboard
OleLockRunning
ReadFmtUserTypeStg
CoGetClassObject
OleDestroyMenuDescriptor
CLSIDFromString
CreateDataAdviseHolder
SetConvertStg
CoTreatAsClass
CoInitializeEx
StgCreateDocfile
CreateFileMoniker
CreateItemMoniker
DoDragDrop
WriteClassStm
OleTranslateAccelerator
CoTaskMemFree
OleCreateFromData
CreateOleAdviseHolder
OleGetClipboard
OleIsRunning
CoUninitialize
OleSetClipboard
CreateBindCtx
StgOpenStorageOnILockBytes
OleCreateMenuDescriptor
OleLoad
OleUninitialize
OleDuplicateData
CoRevokeClassObject
StringFromGUID2
CoTaskMemAlloc
CoCreateGuid
CreateILockBytesOnHGlobal
CoDisconnectObject
CoCreateInstance
CLSIDFromProgID
OleRegGetMiscStatus
CoInitializeSecurity
IsAccelerator
OleRun
CoRegisterClassObject
ReadClassStg
StringFromCLSID
CreateStreamOnHGlobal
OleSaveToStream
StgIsStorageILockBytes
WriteFmtUserTypeStg
OleRegGetUserType
ProgIDFromCLSID
StgIsStorageFile
StgCreateDocfileOnILockBytes
WriteClassStg
OleCreateStaticFromData
GetRunningObjectTable
ReleaseStgMedium
OleRegEnumVerbs
OleSetContainedObject
GetHGlobalFromILockBytes
CoUnmarshalInterface
comctl32
ImageList_AddMasked
ImageList_GetIcon
PropertySheetW
ImageList_DragEnter
ImageList_SetBkColor
DestroyPropertySheetPage
ImageList_BeginDrag
PropertySheetA
_TrackMouseEvent
CreatePropertySheetPageW
ImageList_GetImageInfo
ImageList_Destroy
ImageList_GetIconSize
ImageList_Remove
ImageList_GetImageCount
ord17
ImageList_DragLeave
ImageList_SetImageCount
ImageList_EndDrag
ImageList_Draw
ImageList_LoadImageW
ImageList_Create
ImageList_Add
ImageList_ReplaceIcon
ImageList_Read
ImageList_DragMove
ImageList_Write
ImageList_DrawEx
CreatePropertySheetPageA
ImageList_SetOverlayImage
InitCommonControlsEx
ImageList_LoadImageA
CreateStatusWindowW
advapi32
SetSecurityDescriptorDacl
RegEnumValueA
RegOpenKeyA
OpenThreadToken
CryptHashData
AddAce
RegSetValueExA
DeleteAce
RegCreateKeyA
RegCloseKey
CryptAcquireContextA
RegDeleteValueW
RegFlushKey
DuplicateToken
GetUserNameA
RegQueryValueExW
RegisterServiceCtrlHandlerA
RegEnumKeyA
CopySid
OpenServiceA
GetUserNameW
RegDeleteKeyW
OpenProcessToken
AddAccessAllowedAce
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyExW
AdjustTokenPrivileges
RegQueryValueW
InitializeAcl
RegQueryInfoKeyA
CryptCreateHash
StartServiceA
AccessCheck
RegQueryInfoKeyW
CreateServiceW
RegDeleteValueA
RegOpenKeyExA
GetLengthSid
RegCreateKeyExA
LookupPrivilegeValueA
OpenSCManagerA
RegCreateKeyExW
AllocateAndInitializeSid
CryptReleaseContext
GetSidSubAuthorityCount
GetFileSecurityW
ImpersonateSelf
ControlService
RegEnumKeyExW
RegQueryValueExA
CloseServiceHandle
GetTokenInformation
SetSecurityDescriptorOwner
DeleteService
RegConnectRegistryA
RegSetValueA
SetServiceStatus
GetFileSecurityA
SetFileSecurityA
RegQueryValueA
SetSecurityDescriptorGroup
wininet
InternetWriteFile
InternetCrackUrlA
InternetSetStatusCallback
InternetErrorDlg
InternetReadFile
InternetQueryOptionW
InternetGetConnectedState
HttpQueryInfoW
HttpQueryInfoA
InternetCloseHandle
InternetConnectW
InternetGetLastResponseInfoW
InternetConnectA
InternetSetFilePointer
HttpSendRequestA
HttpAddRequestHeadersA
InternetQueryOptionA
HttpOpenRequestA
InternetSetOptionA
InternetCheckConnectionA
InternetOpenW
InternetOpenA
HttpSendRequestW
InternetCanonicalizeUrlA
InternetQueryDataAvailable
InternetSetOptionW
Sections
.text Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 71KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ