Static task
static1
Behavioral task
behavioral1
Sample
f684bea5e3139380328994a6450560851aef2be0037f59d197f6703b6d50441a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f684bea5e3139380328994a6450560851aef2be0037f59d197f6703b6d50441a.exe
Resource
win10v2004-20221111-en
General
-
Target
f684bea5e3139380328994a6450560851aef2be0037f59d197f6703b6d50441a
-
Size
148KB
-
MD5
3c4e60d6c1d695e9d8a7401b4a134818
-
SHA1
3bed45819c9e0eb82ffe2f76a7cbcd9d7506e8d4
-
SHA256
f684bea5e3139380328994a6450560851aef2be0037f59d197f6703b6d50441a
-
SHA512
f47db7bd24add075e262470a2de0ebe23eea8554a9d85becf876e94bbd3909eb1af9adbe0561309b88312858b9ca8431434c35772f9cf57c2d755e61c214b254
-
SSDEEP
3072:H6LGuAisKMY+lJeLbF8CqkvriuiRjs8pb3lQ4m5:HWOYtjvrhsy9
Malware Config
Signatures
Files
-
f684bea5e3139380328994a6450560851aef2be0037f59d197f6703b6d50441a.exe windows x86
c3e75c3886aeab017ab9c236b5fb49f1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetAdaptersInfo
kernel32
WritePrivateProfileStringA
lstrcatA
lstrcpyA
GetCurrentDirectoryA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCurrentProcess
SetFilePointer
FlushFileBuffers
GetFullPathNameA
GetCPInfo
GetOEMCP
RtlUnwind
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetDriveTypeA
RaiseException
ExitProcess
GetStartupInfoA
GetCommandLineA
GlobalFlags
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
GlobalUnlock
GlobalFree
TlsAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
lstrcpynA
SetLastError
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
FileTimeToLocalFileTime
MultiByteToWideChar
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GetModuleHandleA
GetVersionExA
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
GetTempPathA
SystemTimeToFileTime
GetUserDefaultLangID
CreateToolhelp32Snapshot
Process32First
GetExitCodeProcess
TerminateProcess
Process32Next
LoadLibraryA
GetProcAddress
FreeLibrary
OpenProcess
LocalAlloc
GetFileSize
ReadFile
LocalFree
GetLastError
WaitForSingleObject
FileTimeToSystemTime
GetWindowsDirectoryA
FindFirstFileA
FindClose
GetFileAttributesA
GetSystemDirectoryA
CreateDirectoryA
GetLongPathNameA
CreateFileA
WriteFile
CloseHandle
CopyFileA
SetFileAttributesA
GetLocalTime
lstrlenA
GetVersion
DeleteFileA
MoveFileA
GetCurrentProcessId
GetACP
user32
GetForegroundWindow
GetMessagePos
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
DefWindowProcA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
GetSysColorBrush
DestroyMenu
SetForegroundWindow
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetFocus
ShowWindow
SetWindowPos
SetWindowLongA
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
GetWindowTextA
SetWindowTextA
UnregisterClassA
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
ClientToScreen
GetCapture
UnhookWindowsHookEx
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
EnableWindow
SetCursor
SendMessageA
PostQuitMessage
PostMessageA
GetSystemMetrics
LoadCursorA
wsprintfA
LoadStringA
GetWindow
gdi32
GetClipBox
ScaleWindowExtEx
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
SetWindowExtEx
GetStockObject
SelectObject
RestoreDC
SaveDC
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
CreateBitmap
DeleteDC
DeleteObject
SetBkColor
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegEnumKeyA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ShellExecuteExA
comctl32
ord17
ole32
CoCreateInstance
CoInitialize
wininet
InternetOpenA
HttpAddRequestHeadersA
HttpSendRequestA
InternetConnectA
HttpQueryInfoA
HttpSendRequestExA
InternetWriteFile
HttpEndRequestA
InternetCloseHandle
InternetReadFile
InternetQueryDataAvailable
InternetOpenUrlA
InternetAttemptConnect
HttpOpenRequestA
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ