Static task
static1
Behavioral task
behavioral1
Sample
3d1475f7a128f4fc24b454a950587c283a497980ebde8842be55dee05793b46b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
3d1475f7a128f4fc24b454a950587c283a497980ebde8842be55dee05793b46b.exe
Resource
win10v2004-20220901-en
General
-
Target
3d1475f7a128f4fc24b454a950587c283a497980ebde8842be55dee05793b46b
-
Size
148KB
-
MD5
096950c074390bf51fc38337dfaab22b
-
SHA1
9d35c25b3d3da45c3ac87d50b9e29f16336b7db0
-
SHA256
3d1475f7a128f4fc24b454a950587c283a497980ebde8842be55dee05793b46b
-
SHA512
c33b72e2ae6ade589ceb3410acf1d1a2d0ec72b391bd6db9a960a028915a59e20d230f62e9f6f75fb308cae3745c750a6da3da30468fe539d989685d618c7804
-
SSDEEP
3072:zVeAEKGJ0D/Vw8kmkOWS6QKw2h03rMrqBQWP5m8kYpB4+qm8:ZDQ0LkmkhQb2Kuqqw5m8DB4+qm8
Malware Config
Signatures
Files
-
3d1475f7a128f4fc24b454a950587c283a497980ebde8842be55dee05793b46b.exe windows x86
959cac9b7a9f9ea2388a7252ad2a7c8e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFree
GlobalUnlock
ReleaseMutex
OpenEventA
SetErrorMode
GetCurrentProcess
RaiseException
GetStartupInfoA
GetModuleHandleA
HeapFree
DeleteFileA
ExitProcess
SetLastError
GetLastError
GetModuleFileNameA
SetFilePointer
WriteFile
CreateFileA
RemoveDirectoryA
LocalAlloc
LocalFree
MoveFileA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateDirectoryA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
GetWindowsDirectoryA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
GetProcAddress
GetProcessHeap
HeapAlloc
FreeLibrary
CreateThread
GetLocalTime
GetTickCount
Sleep
InterlockedExchange
SetEvent
CreateEventA
VirtualAlloc
TerminateThread
OpenProcess
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
CreateProcessA
DeviceIoControl
GetVolumeInformationA
GetVersion
VirtualFree
DeleteCriticalSection
CloseHandle
LoadLibraryA
OutputDebugStringA
user32
TranslateMessage
DispatchMessageA
CharNextA
ExitWindowsEx
GetWindowTextA
GetForegroundWindow
GetAsyncKeyState
GetKeyState
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
SetClipboardData
EmptyClipboard
GetClipboardData
LoadCursorA
SystemParametersInfoA
SendMessageA
ReleaseDC
GetDC
GetDesktopWindow
SetRect
GetCursorPos
wsprintfA
SetProcessWindowStation
GetProcessWindowStation
CloseWindow
IsWindow
PostMessageA
OpenDesktopA
GetUserObjectInformationA
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CloseDesktop
OpenInputDesktop
shlwapi
SHDeleteKeyA
gdi32
SelectObject
BitBlt
CreateCompatibleDC
GetDIBits
DeleteObject
DeleteDC
CreateCompatibleBitmap
CreateDIBSection
advapi32
SetEntriesInAclA
LsaOpenPolicy
LsaClose
LookupAccountNameA
IsValidSid
RegQueryValueA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegCreateKeyA
SetNamedSecurityInfoA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
RegOpenKeyA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CloseEventLog
ClearEventLogA
OpenEventLogA
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
LookupAccountSidA
GetTokenInformation
LsaFreeMemory
shell32
SHGetFileInfoA
ShellExecuteA
winmm
waveOutClose
waveOutUnprepareHeader
waveOutReset
waveInClose
waveOutGetNumDevs
waveOutOpen
waveInUnprepareHeader
waveInReset
waveInStop
waveOutWrite
waveInStart
waveInAddBuffer
waveInPrepareHeader
waveInOpen
waveOutPrepareHeader
waveInGetNumDevs
msvcrt
strncpy
_strnicmp
_onexit
__dllonexit
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_beginthreadex
atol
strncat
strtok
wcscpy
_errno
strncmp
atoi
rename
strrchr
_except_handler3
free
malloc
strchr
_strupr
sprintf
puts
putchar
rand
strstr
_ftol
ceil
memmove
_CxxThrowException
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
wininet
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
msvcp60
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
netapi32
NetUserAdd
NetLocalGroupAddMembers
urlmon
URLDownloadToFileA
avicap32
capGetDriverDescriptionA
msvfw32
ICSeqCompressFrameEnd
ICSendMessage
psapi
GetModuleFileNameExA
EnumProcessModules
wtsapi32
WTSFreeMemory
Sections
.text Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 316B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ