Static task
static1
Behavioral task
behavioral1
Sample
c3475779dfcd1ae7e0d835050a6e6ce1fba4855a2c1ef7a087b6555320b6a116.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c3475779dfcd1ae7e0d835050a6e6ce1fba4855a2c1ef7a087b6555320b6a116.exe
Resource
win10v2004-20221111-en
General
-
Target
c3475779dfcd1ae7e0d835050a6e6ce1fba4855a2c1ef7a087b6555320b6a116
-
Size
326KB
-
MD5
a832a22cb715e120e9bc6fe007a646fc
-
SHA1
22d48bd34bbb4cc41734cca3b895debe56694e4d
-
SHA256
c3475779dfcd1ae7e0d835050a6e6ce1fba4855a2c1ef7a087b6555320b6a116
-
SHA512
7506a195d2b0012724845ee26120bcfa698ba56068fcd3afaa0d539ecc384d1071863e8e0b64307fbe6f9b61b1ed3027c7cfd539596fa8b3408bb6f9eea0c0e8
-
SSDEEP
6144:i/1kluu57SozxhM/o7duhZW1/8CBdECafVLG0WZS1e74ZClX9kAmsKBdp9gubr0n:i/1kj7S2xhM/o7Qhw1kpVK0K4ZCjkAmY
Malware Config
Signatures
Files
-
c3475779dfcd1ae7e0d835050a6e6ce1fba4855a2c1ef7a087b6555320b6a116.exe windows x86
5f07912e06c961853983fc289e5e887a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
UuidCreate
kernel32
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadCodePtr
IsBadReadPtr
IsBadWritePtr
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LoadResource
LocalAlloc
LocalFree
LocalReAlloc
LockFile
LockResource
MapViewOfFile
MultiByteToWideChar
OpenEventW
OpenFileMappingW
OpenMutexW
OutputDebugStringW
RaiseException
ReadFile
ReleaseMutex
ResetEvent
ResumeThread
RtlUnwind
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFilePointer
SetHandleCount
SetLastError
SetStdHandle
SetThreadPriority
SetUnhandledExceptionFilter
HeapCreate
Sleep
SuspendThread
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcatW
lstrcmpA
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenA
lstrlenW
HeapAlloc
GlobalUnlock
GlobalReAlloc
GlobalLock
GlobalHandle
CloseHandle
CompareStringA
CompareStringW
CopyFileW
CreateEventW
CreateFileMappingW
CreateFileW
CreateMutexW
CreatePipe
CreateProcessW
CreateThread
SizeofResource
DeleteCriticalSection
DeleteFileW
DisableThreadLibraryCalls
DuplicateHandle
EnterCriticalSection
ExitProcess
GlobalFree
GlobalFlags
GlobalFindAtomW
GlobalDeleteAtom
GlobalAlloc
GlobalAddAtomW
GetVolumeInformationW
GetVersionExW
GetVersionExA
ExitThread
GetVersion
GetTimeZoneInformation
GetTickCount
GetSystemTimeAsFileTime
GetSystemTime
GetSystemDirectoryW
GetStringTypeW
GetStringTypeA
GetStdHandle
GetStartupInfoW
GetStartupInfoA
GetShortPathNameW
GetProcessVersion
GetProcessHeap
GetProcAddress
GetOEMCP
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetModuleFileNameA
GetLocalTime
GetLastError
GetFullPathNameW
GetFileType
GetFileTime
GetFileSize
GetFileAttributesW
GetExitCodeProcess
GetEnvironmentVariableW
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStringsA
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetCommandLineA
GetCPInfo
GetACP
FreeLibrary
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FlushFileBuffers
FindResourceW
FindFirstFileW
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
user32
WinHelpW
ValidateRect
UnhookWindowsHookEx
TranslateMessage
TabbedTextOutW
SystemParametersInfoW
ShowWindow
SetWindowsHookExW
SetWindowTextW
AdjustWindowRectEx
CallNextHookEx
CallWindowProcW
CharNextW
CharUpperW
CheckMenuItem
ClientToScreen
CopyRect
CreateWindowExW
DefWindowProcW
DestroyMenu
DestroyWindow
DispatchMessageW
DrawTextW
EnableMenuItem
EnableWindow
GetActiveWindow
GetCapture
GetClassInfoW
GetClassNameW
GetClientRect
GetCursorPos
GetDC
SetWindowPos
SetWindowLongW
SetPropW
SetMenuItemBitmaps
SetForegroundWindow
SetFocus
SendMessageW
RemovePropW
ReleaseDC
RegisterWindowMessageW
RegisterClassW
PtInRect
PostQuitMessage
PostMessageW
PeekMessageW
ModifyMenuW
MessageBoxW
MapWindowPoints
LoadStringW
LoadIconW
LoadCursorW
LoadBitmapW
IsWindowVisible
IsWindowEnabled
IsIconic
GrayStringW
GetWindowTextW
GetWindowRect
GetWindowPlacement
GetWindowLongW
GetWindow
GetTopWindow
GetSystemMetrics
GetSysColorBrush
GetSysColor
GetSubMenu
GetPropW
GetParent
GetNextDlgTabItem
GetMessageW
GetMessageTime
GetMessagePos
GetMenuState
GetMenuItemCount
GetMenuCheckMarkDimensions
GetMenu
GetLastActivePopup
GetKeyState
GetForegroundWindow
GetFocus
GetDlgItem
GetDlgCtrlID
GetMenuItemID
gdi32
TextOutW
SetWindowExtEx
SetViewportOrgEx
SetViewportExtEx
SetTextColor
SetMapMode
SetBkColor
SelectObject
ScaleWindowExtEx
CreateBitmap
DeleteDC
DeleteObject
Escape
ExtTextOutW
GetClipBox
GetDeviceCaps
GetObjectW
GetStockObject
OffsetViewportOrgEx
PtVisible
RectVisible
RestoreDC
SaveDC
ScaleViewportExtEx
comdlg32
GetFileTitleW
winspool.drv
AddPrinterDriverW
AddPrinterW
ClosePrinter
DeletePrinter
DeletePrinterDriverExW
XcvDataW
SetPrinterW
SetPrinterDataW
SetPrinterDataExW
OpenPrinterW
GetPrinterW
GetPrinterDriverDirectoryW
GetPrinterDataW
GetPrinterDataExW
EnumPrintersW
EnumPrinterKeyW
EnumPrinterDriversW
EnumPrinterDataExW
EnumPortsW
DocumentPropertiesW
advapi32
GetTokenInformation
RegCreateKeyExW
RegCloseKey
QueryServiceStatus
OpenThreadToken
OpenServiceW
OpenSCManagerW
UnlockServiceDatabase
StartServiceW
SetServiceStatus
SetSecurityInfo
SetSecurityDescriptorDacl
SetEntriesInAclW
ReportEventW
RegisterEventSourceW
RegSetValueExW
RegQueryValueExW
RegQueryValueExA
RegOpenKeyW
RegOpenKeyExW
RegOpenKeyA
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
AddAccessAllowedAce
AddAce
AllocateAndInitializeSid
CloseServiceHandle
ControlService
CreateProcessAsUserW
DeregisterEventSource
EqualSid
FreeSid
GetAce
GetAclInformation
GetLengthSid
GetSecurityDescriptorDacl
GetSidIdentifierAuthority
GetSidSubAuthority
GetSidSubAuthorityCount
OpenProcessToken
GetUserNameW
InitializeAcl
InitializeSecurityDescriptor
IsValidSid
LockServiceDatabase
LookupAccountNameW
LookupAccountSidW
RegCreateKeyW
comctl32
ord17
ole32
CoInitialize
CoCreateInstance
CoSetProxyBlanket
StringFromGUID2
CLSIDFromString
oleaut32
SysAllocString
LoadRegTypeLi
LoadTypeLi
RegisterTypeLi
SafeArrayCreate
SafeArrayDestroy
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayPutElement
SafeArrayGetElement
SysAllocStringLen
SysFreeString
SysStringLen
VariantClear
VariantCopy
VariantInit
crypt32
CertOIDToAlgId
ddraw
DirectDrawCreateClipper
dinput
DirectInputCreateEx
Sections
.text Size: 240KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ