Static task
static1
Behavioral task
behavioral1
Sample
a3c389fb3bb8f06b85ee9ebac0aecb7ecfca420dc9395dcaf4e61022e951d7b0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a3c389fb3bb8f06b85ee9ebac0aecb7ecfca420dc9395dcaf4e61022e951d7b0.exe
Resource
win10v2004-20220812-en
General
-
Target
a3c389fb3bb8f06b85ee9ebac0aecb7ecfca420dc9395dcaf4e61022e951d7b0
-
Size
859KB
-
MD5
24d847003d824b894d751ab94036dab0
-
SHA1
7a4e10190bca9ec3b027dc58c423ea8b376a59b4
-
SHA256
a3c389fb3bb8f06b85ee9ebac0aecb7ecfca420dc9395dcaf4e61022e951d7b0
-
SHA512
e2265bc91e5b27a0ff6a79ac135c620cdec6b3582415880f320ae5100337022bafe9066d75b8fc056d655385dd01a3e9481583e7bdc04eb35a987cc518b0599f
-
SSDEEP
24576:lAQFI+fS9G6BuT83gfkfW0K8NPQdnuEX:lAJ91uT83gk5K8tAu
Malware Config
Signatures
Files
-
a3c389fb3bb8f06b85ee9ebac0aecb7ecfca420dc9395dcaf4e61022e951d7b0.exe windows x86
27d07a3b0afc16fbca920846f4118823
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
RegEnumValueA
RegSetValueExA
RegOpenKeyA
SetSecurityDescriptorDacl
RegQueryInfoKeyA
comctl32
InitCommonControlsEx
ord17
ImageList_GetIcon
DestroyPropertySheetPage
PropertySheetA
ImageList_LoadImageA
ImageList_Draw
version
VerLanguageNameA
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
user32
GetWindowRect
ClientToScreen
FillRect
CheckMenuItem
DeferWindowPos
InvalidateRect
LoadBitmapA
ScreenToClient
EnableMenuItem
GetSysColorBrush
GetSysColor
EmptyClipboard
DestroyMenu
IsWindowVisible
IsMenu
GetActiveWindow
EndPaint
GetSystemMenu
InvertRect
SetRectEmpty
ShowCaret
RedrawWindow
IsZoomed
IsDialogMessageA
FindWindowA
DestroyWindow
GetSystemMetrics
SetMenuDefaultItem
GetClassNameA
CallNextHookEx
DrawFrameControl
SetActiveWindow
GetMenu
GetDCEx
CopyRect
GetTabbedTextExtentA
SetFocus
EnableWindow
GetParent
SetWindowLongA
RemovePropA
DrawTextA
IsChild
UpdateWindow
GetIconInfo
GetWindowThreadProcessId
GetWindow
DestroyIcon
DefWindowProcA
GetWindowTextLengthA
CreateDialogIndirectParamA
SetCursor
ShowWindow
GetSubMenu
SetWindowsHookExA
PostMessageA
EqualRect
PostThreadMessageA
SetWindowPos
DispatchMessageA
TrackPopupMenu
DestroyCursor
GetWindowLongA
CreatePopupMenu
UnhookWindowsHookEx
OffsetRect
SetPropA
BeginPaint
GetNextDlgTabItem
DrawIcon
PostQuitMessage
SetTimer
GetMessagePos
GetMessageTime
GetMenuItemCount
OpenClipboard
MapWindowPoints
SetMenu
wsprintfA
FlashWindow
CreateWindowExA
MessageBeep
RegisterClipboardFormatA
GetClipboardData
GetDC
GetDlgItem
GetPropA
SetWindowContextHelpId
ModifyMenuA
DrawStateA
GetDesktopWindow
GetCapture
IsWindow
SendMessageA
PtInRect
GetDlgItemInt
GetDlgCtrlID
RegisterClassExA
DestroyAcceleratorTable
MapDialogRect
LoadCursorA
SetClipboardData
SetParent
ReleaseDC
IsIconic
LoadStringA
UnregisterClassA
DeleteMenu
CharUpperA
GetFocus
LoadIconA
MessageBoxA
LoadImageA
CallWindowProcA
SetForegroundWindow
GetWindowDC
RegisterClassA
ShowOwnedPopups
LoadAcceleratorsA
MoveWindow
DrawFocusRect
SetWindowTextA
GetWindowPlacement
GetMenuItemID
IsRectEmpty
kernel32
GetConsoleOutputCP
LoadLibraryW
GetModuleHandleA
HeapReAlloc
FlushFileBuffers
FreeEnvironmentStringsW
GetLastError
IsDebuggerPresent
HeapAlloc
InterlockedIncrement
LCMapStringA
DebugBreak
LeaveCriticalSection
ExitProcess
UnhandledExceptionFilter
GetVersionExA
GetConsoleCP
OutputDebugStringA
OutputDebugStringW
GetStringTypeW
GetProcAddress
TlsAlloc
CompareStringA
GetModuleFileNameW
TerminateProcess
SetFilePointer
IsBadReadPtr
RaiseException
WriteFile
DeleteCriticalSection
GetEnvironmentStrings
GetCurrentProcess
GetSystemTimeAsFileTime
SetLastError
InitializeCriticalSection
CreateFileA
MultiByteToWideChar
GetCPInfo
SetEnvironmentVariableA
FreeEnvironmentStringsA
SetConsoleCtrlHandler
TlsFree
WriteConsoleW
GetModuleFileNameA
VirtualAlloc
GetProcessHeap
GetConsoleMode
SetHandleCount
GetTimeFormatA
GetStdHandle
GetCurrentThreadId
HeapValidate
CreateMutexA
GetACP
SetStdHandle
GetStartupInfoA
WideCharToMultiByte
GetTimeZoneInformation
ReadFile
GetTickCount
GetEnvironmentStringsW
GetOEMCP
EnterCriticalSection
VirtualFree
HeapDestroy
CloseHandle
RtlUnwind
HeapCreate
VirtualQuery
GetCurrentProcessId
GetFileType
GetLocaleInfoA
IsValidCodePage
InterlockedExchange
TlsGetValue
GetStringTypeA
CompareStringW
GetDateFormatA
WriteConsoleA
HeapFree
InterlockedDecrement
GetCommandLineA
TlsSetValue
SetUnhandledExceptionFilter
QueryPerformanceCounter
LCMapStringW
LoadLibraryA
gdi32
CreateFontIndirectA
SelectClipRgn
ExtSelectClipRgn
GetTextAlign
StretchDIBits
SetWindowOrgEx
CreatePolygonRgn
Pie
GetBitmapBits
GetStockObject
OffsetRgn
FillRgn
SetTextColor
StrokePath
CreateDCA
StretchBlt
LineTo
BitBlt
GetDIBits
AbortDoc
CreatePalette
ScaleWindowExtEx
GetTextColor
CreateDIBitmap
GetViewportOrgEx
DeleteDC
SetMapMode
CreateCompatibleBitmap
CreateBitmap
RealizePalette
SetTextJustification
CreateFontA
DeleteObject
GetTextExtentPoint32W
ScaleViewportExtEx
RectVisible
SaveDC
PtInRegion
SetROP2
SetViewportOrgEx
StartDocA
SetTextAlign
SetPixel
PolyBezier
PatBlt
SetStretchBltMode
LPtoDP
SetRectRgn
CreateRectRgnIndirect
Arc
CreateRectRgn
GetDeviceCaps
SetAbortProc
RestoreDC
CreatePen
ExcludeClipRect
Escape
PtVisible
FrameRgn
SetPixelV
GetTextExtentPointA
MaskBlt
SelectPalette
MoveToEx
SetBkColor
SetWindowExtEx
BeginPath
SetBkMode
CombineRgn
GetPixel
GetObjectA
CreateCompatibleDC
CreatePatternBrush
GetTextFaceA
TextOutA
EndPath
Ellipse
Rectangle
Sections
.text Size: 213KB - Virtual size: 212KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 507KB - Virtual size: 507KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 110KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ