Static task
static1
Behavioral task
behavioral1
Sample
3daf25f7c9ece3318508e35acba77dd6b68eb0fd554db86283f9762ac2852c79.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3daf25f7c9ece3318508e35acba77dd6b68eb0fd554db86283f9762ac2852c79.exe
Resource
win10v2004-20220812-en
General
-
Target
3daf25f7c9ece3318508e35acba77dd6b68eb0fd554db86283f9762ac2852c79
-
Size
500KB
-
MD5
3ff08fce20ce0247ef3da7f7dafdaf14
-
SHA1
f9881234f1612b74d97028c9383027dd9ea94c22
-
SHA256
3daf25f7c9ece3318508e35acba77dd6b68eb0fd554db86283f9762ac2852c79
-
SHA512
0c9df7c78b0aee3caf8d5f1487dd0f23995bed5a728f8c49ab65224f72d5cd8ccb09ca32f3a5af97686c063d78001a78f205ecfbea36038629c1079203483d3a
-
SSDEEP
6144:EiESaqmpVsTo7jrQMlvAfmyAKREtiXgy6FFfSmg/YNLPbzb5SQy92XgQuW31He:Uf+o7jrQ4KROHRF0YNLP39SQkSgB
Malware Config
Signatures
Files
-
3daf25f7c9ece3318508e35acba77dd6b68eb0fd554db86283f9762ac2852c79.exe windows x86
9495b3524331335c695aad641ab8985b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
lstrlenA
SetErrorMode
GetFileAttributesW
GetFileTime
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
HeapReAlloc
ExitProcess
SetStdHandle
GetFileType
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GlobalFlags
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetTimeFormatA
GetDateFormatA
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetCurrentDirectoryA
GetDriveTypeA
CreateFileA
SetEnvironmentVariableA
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
InterlockedDecrement
GetVersionExW
FindNextFileW
LocalAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
WritePrivateProfileStringW
GetCurrentThread
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
lstrcmpA
GetLocaleInfoW
CompareStringA
InterlockedExchange
GetFullPathNameW
GetVolumeInformationW
FindFirstFileW
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
GetThreadLocale
DeleteFileW
GetCurrentProcessId
GetModuleHandleA
GlobalAlloc
FormatMessageW
LocalFree
MulDiv
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetCurrentThreadId
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
CompareStringW
LoadLibraryA
GetLastError
SetLastError
lstrcmpW
GetModuleHandleW
GetProcAddress
GetVersionExA
ResetEvent
CreateDirectoryW
GetModuleFileNameW
CreateEventW
WideCharToMultiByte
OutputDebugStringW
SetEvent
lstrcatW
MultiByteToWideChar
lstrcpyW
FreeLibrary
LoadLibraryW
GetWindowsDirectoryW
WinExec
lstrlenW
FindResourceW
LoadResource
LockResource
SizeofResource
WriteFile
SetCommMask
WaitForSingleObject
CloseHandle
CreateThread
PurgeComm
SetCommState
GetCommState
SetCommTimeouts
SetupComm
CreateFileW
Sleep
ReadFile
GetCommandLineW
GetTickCount
user32
SetRect
CharNextW
CopyAcceleratorTableW
IsRectEmpty
InvalidateRgn
GetNextDlgGroupItem
UnregisterClassW
SetParent
GetDCEx
LockWindowUpdate
RegisterClipboardFormatW
PostThreadMessageW
IsZoomed
CharUpperW
GetWindowThreadProcessId
GetCursorPos
WindowFromPoint
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuW
EnableMenuItem
CheckMenuItem
ShowWindow
MoveWindow
SetWindowTextW
IsDialogMessageW
SetDlgItemTextW
GetMenuState
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamW
IsWindowEnabled
GetNextDlgTabItem
RegisterWindowMessageW
SendDlgItemMessageA
WinHelpW
IsChild
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
SetPropW
GetPropW
RemovePropW
SetFocus
GetWindowTextLengthW
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
SetActiveWindow
DispatchMessageW
BeginDeferWindowPos
EndDeferWindowPos
GetDlgItem
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageW
MapWindowPoints
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
MessageBoxW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
CopyRect
DefWindowProcW
CallWindowProcW
GetWindowLongW
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
LoadBitmapW
GetWindow
PostMessageW
AppendMenuW
GetSysColorBrush
DestroyMenu
GetMessageW
TranslateMessage
GetSystemMenu
LoadIconW
ValidateRect
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
SendDlgItemMessageW
SetRectEmpty
EndDialog
DrawIcon
GetSystemMetrics
FindWindowW
SetTimer
IsIconic
KillTimer
BringWindowToTop
GetDlgCtrlID
CloseClipboard
GetClipboardData
OpenClipboard
GetKeyState
GetFocus
ReleaseCapture
GetParent
PtInRect
GetWindowRect
InvalidateRect
GetClientRect
MessageBeep
IsWindow
CopyIcon
LoadCursorW
SendMessageW
GetSysColor
InflateRect
ReleaseDC
SetWindowLongW
SetCursor
SetCapture
GetDC
RedrawWindow
EnableWindow
GetTopWindow
UnregisterClassA
gdi32
ExtSelectClipRgn
DeleteDC
CreatePatternBrush
ScaleWindowExtEx
PatBlt
GetTextMetricsW
SetRectRgn
CombineRgn
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
GetWindowExtEx
GetViewportExtEx
CreateRectRgn
SelectClipRgn
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
CreateRectRgnIndirect
GetTextExtentPoint32W
IntersectClipRect
ExcludeClipRect
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
SetBkColor
SetTextColor
GetClipBox
DeleteObject
CreateSolidBrush
GetStockObject
CreateFontIndirectW
GetObjectW
comdlg32
GetFileTitleW
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
RegEnumKeyW
RegOpenKeyExW
RegQueryValueExW
RegOpenKeyW
RegEnumValueW
RegCloseKey
RegQueryValueW
shell32
ShellExecuteW
comctl32
InitCommonControlsEx
shlwapi
PathIsUNCW
PathFindExtensionW
PathFindFileNameW
PathStripToRootW
UrlUnescapeW
oledlg
OleUIBusyW
ole32
CoRegisterMessageFilter
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
oleaut32
SysAllocString
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
SysFreeString
SysStringLen
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
ws2_32
WSACleanup
gethostname
WSAStartup
inet_ntoa
gethostbyname
wininet
InternetOpenUrlW
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallbackW
InternetOpenW
InternetGetLastResponseInfoW
InternetCloseHandle
HttpQueryInfoW
InternetQueryDataAvailable
InternetCanonicalizeUrlW
InternetCrackUrlW
InternetSetOptionExW
InternetQueryOptionW
Sections
.text Size: 368KB - Virtual size: 366KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ