Static task
static1
Behavioral task
behavioral1
Sample
3f083c59f9438eeb7a28f3373e5d4b5e57f6a72d9a354fe51c707604f8aa023e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3f083c59f9438eeb7a28f3373e5d4b5e57f6a72d9a354fe51c707604f8aa023e.exe
Resource
win10v2004-20220812-en
General
-
Target
3f083c59f9438eeb7a28f3373e5d4b5e57f6a72d9a354fe51c707604f8aa023e
-
Size
2.5MB
-
MD5
00f48c1bc83e68d0bcb56eb3eee3334f
-
SHA1
6ee86ac7b2d7ccda30fb285a5311b0a4e471841d
-
SHA256
3f083c59f9438eeb7a28f3373e5d4b5e57f6a72d9a354fe51c707604f8aa023e
-
SHA512
093e5462599c4bc2e92d0544f23702c0cebc3e5587120ef592ce1246c76664a28d9ef010e567d5fd81b519ff0eb7cae715fa5675e7c8786a6317b3699958a8bd
-
SSDEEP
49152:6avC7TzMkHCaT6x5zNxTqUYi/UUTFnBWXuuBVxxv6ZnUM3fapNJ:6aa7MecDNTpMUxnBWeuBVxAZnUzp
Malware Config
Signatures
Files
-
3f083c59f9438eeb7a28f3373e5d4b5e57f6a72d9a354fe51c707604f8aa023e.exe windows x86
c5001699e2233a290f75d56186e4d7cd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
RaiseException
CreateThread
ExitThread
HeapSize
HeapReAlloc
GetACP
GetTimeZoneInformation
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
TerminateProcess
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
ExitProcess
RtlUnwind
FileTimeToLocalFileTime
GetProfileStringA
FileTimeToSystemTime
GetFullPathNameA
FindFirstFileA
FindClose
DeleteFileA
SetEndOfFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
SetErrorMode
GetOEMCP
GetCPInfo
GetCurrentDirectoryA
WritePrivateProfileStringA
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
GetProcessVersion
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GlobalFlags
lstrcpynA
LoadLibraryA
FreeLibrary
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
CreateEventA
SuspendThread
SetThreadPriority
ResumeThread
GetLastError
SetEvent
CloseHandle
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
lstrcpyA
LocalFree
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
GlobalLock
GlobalUnlock
MulDiv
GetModuleHandleA
GetProcAddress
SetLastError
GlobalFree
GetTempPathA
GetSystemDirectoryA
CreateProcessA
WaitForSingleObject
LoadLibraryExA
EnumResourceNamesA
FindResourceA
LoadResource
LockResource
SizeofResource
GetModuleFileNameA
CreateMutexA
GetEnvironmentStrings
user32
GetSysColor
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
SetDlgItemTextA
IsDialogMessageA
SetWindowTextA
ShowWindow
LoadStringA
DestroyMenu
GetClassNameA
PtInRect
LoadCursorA
GetSysColorBrush
InflateRect
InvalidateRect
GetTopWindow
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
CreateWindowExA
GetClassLongA
SetPropA
SetFocus
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
CopyRect
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetMessageA
TranslateMessage
DispatchMessageA
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostQuitMessage
PostMessageA
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
LoadIconA
SendMessageA
AppendMenuA
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DrawFocusRect
DefDlgProcA
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
AdjustWindowRectEx
UnhookWindowsHookEx
GetDC
ClientToScreen
ScreenToClient
EnableWindow
GetDesktopWindow
MessageBoxA
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetSystemMenu
IsWindowUnicode
CharNextA
SetWindowPos
gdi32
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
IntersectClipRect
DeleteObject
SetViewportExtEx
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
CreateBitmap
PatBlt
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetBkMode
SetBkColor
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
SetTextColor
GetObjectA
CreateDIBitmap
GetTextExtentPointA
BitBlt
CreateCompatibleDC
comdlg32
GetOpenFileNameA
GetSaveFileNameA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
comctl32
ord17
Sections
.text Size: 108KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ