Static task
static1
Behavioral task
behavioral1
Sample
34bbf370809d87b6eda27d0496e5f5e87912cf23f60dc590bd4cfd6c2b437348.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
34bbf370809d87b6eda27d0496e5f5e87912cf23f60dc590bd4cfd6c2b437348.exe
Resource
win10v2004-20220812-en
General
-
Target
34bbf370809d87b6eda27d0496e5f5e87912cf23f60dc590bd4cfd6c2b437348
-
Size
368KB
-
MD5
30eb3b3ce277a94297fe32cf32351ac0
-
SHA1
9b06251c1ad907bded154c4c3521adcc76186998
-
SHA256
34bbf370809d87b6eda27d0496e5f5e87912cf23f60dc590bd4cfd6c2b437348
-
SHA512
b5da09eafbf401bafbc7fb4fabadaa9b2efbe5f2587ed6d6dd4061efb5b805ef751623676c9b2a0ee409c307e795d0d604429436629fcd897076c0cac23ec857
-
SSDEEP
6144:D3g541vDMOxtuBUOKnNq2TBJYg/qzge9hTaPFViN3f1nGN4Yt1uIJDj:DQ5OAOxtuUOKNq2TrYgCHatViN3fTYrB
Malware Config
Signatures
Files
-
34bbf370809d87b6eda27d0496e5f5e87912cf23f60dc590bd4cfd6c2b437348.exe windows x86
407d39887a273313c075d9922452d69f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dbghelp
MiniDumpWriteDump
wininet
HttpOpenRequestA
InternetConnectA
InternetSetOptionA
InternetWriteFile
InternetReadFile
HttpQueryInfoW
HttpSendRequestW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetConnectW
InternetOpenW
HttpEndRequestA
InternetCloseHandle
HttpAddRequestHeadersA
HttpSendRequestExA
InternetOpenA
rpcrt4
UuidCreate
iphlpapi
GetAdaptersInfo
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
kernel32
HeapAlloc
GetProcessHeap
HeapFree
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
GetCommandLineW
GetCurrentProcessId
GetCurrentThreadId
WaitForSingleObject
CloseHandle
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
WideCharToMultiByte
DeleteFileW
RemoveDirectoryW
GetLogicalDriveStringsW
QueryDosDeviceW
OpenProcess
GetProcessTimes
GetVersionExW
LoadLibraryA
GetProcAddress
FreeLibrary
SetCurrentDirectoryW
lstrlenW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetCurrentProcess
FlushInstructionCache
SetLastError
RaiseException
GetModuleHandleW
GetVolumeInformationA
GlobalAlloc
GlobalFree
CreateFileW
DeviceIoControl
MultiByteToWideChar
VirtualQueryEx
OpenFileMappingW
ReadProcessMemory
GetPrivateProfileStringW
WriteFile
GetLastError
GetFileSize
GetStringTypeW
FindClose
GetTimeZoneInformation
FindFirstFileW
lstrcpyW
FindNextFileW
GetTempPathW
FileTimeToSystemTime
SetErrorMode
GetDiskFreeSpaceExW
GlobalMemoryStatusEx
lstrlenA
GetComputerNameW
GetTickCount
FlushFileBuffers
CreateProcessW
SystemTimeToTzSpecificLocalTime
CompareStringW
lstrcmpiW
MulDiv
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InterlockedDecrement
InterlockedIncrement
GetCPInfo
RtlUnwind
HeapCreate
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
FindFirstFileExW
GetDriveTypeW
FileTimeToLocalFileTime
GetFileAttributesW
CreateThread
ExitThread
TlsAlloc
DecodePointer
EncodePointer
GetDateFormatW
GetTimeFormatW
GetSystemTimeAsFileTime
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedCompareExchange
HeapSize
HeapReAlloc
HeapDestroy
Sleep
ReadFile
ExitProcess
GetACP
TlsGetValue
TlsSetValue
TlsFree
GetOEMCP
LCMapStringW
GetStdHandle
GetFileInformationByHandle
PeekNamedPipe
GetFileType
GetCurrentDirectoryW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
SetStdHandle
GetConsoleCP
GetConsoleMode
SetFilePointer
LoadLibraryW
SetEndOfFile
WriteConsoleW
SetEnvironmentVariableA
IsValidCodePage
GetFullPathNameW
CreateFileA
user32
EndDialog
CreateWindowExW
DestroyWindow
IsWindowVisible
LoadCursorW
GetClassNameW
RedrawWindow
CharNextW
SetRectEmpty
DrawIconEx
ScreenToClient
GetCursorPos
GetDlgCtrlID
ReleaseCapture
GetCapture
SetCapture
SetFocus
ShowWindow
GetWindow
MonitorFromWindow
SetCursor
DrawFocusRect
GetFocus
GetSysColor
IsWindowEnabled
UpdateWindow
MapWindowPoints
SetWindowPos
IsWindow
GetDC
ReleaseDC
GetClientRect
DrawTextW
OffsetRect
GetSystemMetrics
GetWindowRect
GetDlgItem
SetWindowTextW
GetWindowTextW
LoadImageW
LoadStringW
SetWindowLongW
GetWindowLongW
CallWindowProcW
DestroyIcon
DialogBoxParamW
DefWindowProcW
GetSysColorBrush
GetActiveWindow
InvalidateRect
GetWindowTextLengthW
EndPaint
GetParent
SendMessageW
FillRect
BeginPaint
GetMonitorInfoW
PtInRect
UnregisterClassA
LoadIconW
gdi32
DeleteObject
TextOutW
SelectObject
GetObjectW
GetStockObject
SetBkMode
CreateFontIndirectW
SetTextColor
advapi32
InitializeSecurityDescriptor
RegSetValueExW
RegCreateKeyExW
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
SetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptDeriveKey
CryptDecrypt
CryptReleaseContext
GetUserNameW
shell32
ord165
SHGetFolderPathW
ShellExecuteW
ole32
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
SysAllocStringLen
SysAllocString
VarBstrCmp
SysFreeString
comctl32
_TrackMouseEvent
imm32
ImmDisableIME
psapi
GetModuleFileNameExW
EnumProcessModules
GetMappedFileNameW
GetProcessImageFileNameW
Sections
.text Size: 192KB - Virtual size: 191KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.trdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE