Static task
static1
Behavioral task
behavioral1
Sample
34caaf5a11ac7a5002b8dc011cf7a1d73b2e53bbe701dc680b7ba49fd0bffea8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
34caaf5a11ac7a5002b8dc011cf7a1d73b2e53bbe701dc680b7ba49fd0bffea8.exe
Resource
win10v2004-20220901-en
General
-
Target
34caaf5a11ac7a5002b8dc011cf7a1d73b2e53bbe701dc680b7ba49fd0bffea8
-
Size
168KB
-
MD5
bd8ad845cc64c0dc7890f9f2a436c04a
-
SHA1
b7c3898d6670b0e2a5c2ba9a8e57e1b237a77a18
-
SHA256
34caaf5a11ac7a5002b8dc011cf7a1d73b2e53bbe701dc680b7ba49fd0bffea8
-
SHA512
d8d313f41500c66a98fb6137b9abd914f1884a80ffdfbd7e24f9f31b7a9b98009a926d0fabb253d1242569f0d4f0323d242c406ac524b96643497b932e46062f
-
SSDEEP
3072:tsu/ue4Z/ODIdetHshtY/R31jqlkhQEoQNN:9/ue4ZGQushWpFWlkGq
Malware Config
Signatures
Files
-
34caaf5a11ac7a5002b8dc011cf7a1d73b2e53bbe701dc680b7ba49fd0bffea8.exe windows x86
f25552778cebf01f3f35c0677842e240
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexA
CloseHandle
FindClose
FindFirstFileA
FindNextFileA
WaitForSingleObject
CreateProcessA
TerminateProcess
OpenProcess
Sleep
Process32Next
Process32First
CreateToolhelp32Snapshot
CompareStringA
SetEndOfFile
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetFilePointer
FlushFileBuffers
SetStdHandle
GetLastError
HeapFree
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
HeapAlloc
RtlUnwind
SetEnvironmentVariableA
GetCurrentDirectoryA
SetCurrentDirectoryA
RemoveDirectoryA
DeleteFileA
GetProcAddress
GetModuleHandleA
ExitProcess
GetCommandLineA
GetVersionExA
GetProcessHeap
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetFullPathNameA
WriteFile
GetConsoleCP
GetConsoleMode
ReadFile
GetStdHandle
GetModuleFileNameA
SetHandleCount
GetFileType
GetStartupInfoA
LoadLibraryA
InitializeCriticalSection
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetTimeZoneInformation
CompareStringW
user32
MessageBoxA
EnumWindows
GetWindowThreadProcessId
PostMessageA
RegisterWindowMessageA
SendMessageA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ