Static task
static1
Behavioral task
behavioral1
Sample
334fff41781ad0c020414693bbea7cd062159032f90c34fb6494f6a2610ec4b6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
334fff41781ad0c020414693bbea7cd062159032f90c34fb6494f6a2610ec4b6.exe
Resource
win10v2004-20220812-en
General
-
Target
334fff41781ad0c020414693bbea7cd062159032f90c34fb6494f6a2610ec4b6
-
Size
237KB
-
MD5
308f23400e4000d537b93bee34c76c20
-
SHA1
85bc177e7c479c1445d49b4f0eb8057da8bbd990
-
SHA256
334fff41781ad0c020414693bbea7cd062159032f90c34fb6494f6a2610ec4b6
-
SHA512
82b8755d9c8dabdc5019eabff138d48c8e0591002a6aa67bc7de7aba9e0944d43ac8c029e365c90b577fc5b671c723e6fca9cc07fe18aa19d0922079159dd3e5
-
SSDEEP
3072:dRAhrYwMjMNX2E4NOSBh53VY09lnprykMH5ZzL48Cy/:nerYRjMNX2xZBlp5CL4g
Malware Config
Signatures
Files
-
334fff41781ad0c020414693bbea7cd062159032f90c34fb6494f6a2610ec4b6.exe windows x86
664ad68120361779226e0c390ff4562b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
ws2_32
connect
send
recv
closesocket
WSAStartup
socket
gethostbyaddr
htonl
htons
getservbyport
ntohs
ntohl
WSAGetLastError
gethostbyname
gethostname
iphlpapi
SetTcpEntry
GetTcpTable
GetUdpTable
comctl32
ord17
ord6
ImageList_Create
ImageList_ReplaceIcon
CreateToolbarEx
kernel32
OpenProcess
CreateEventA
DeviceIoControl
GetCurrentProcessId
DuplicateHandle
GetModuleFileNameA
DeleteFileA
GetSystemDirectoryA
GetVersion
FormatMessageA
GetTickCount
SetEvent
TerminateProcess
GlobalReAlloc
GlobalUnlock
GlobalLock
GlobalAlloc
lstrcatA
HeapFree
lstrlenA
lstrcpyA
HeapAlloc
GetProcessHeap
GetUserDefaultLangID
LeaveCriticalSection
EnterCriticalSection
WaitForSingleObject
InitializeCriticalSection
ExpandEnvironmentStringsA
SetFilePointer
FlushFileBuffers
SetStdHandle
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetModuleHandleA
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
Sleep
GetFileType
SetHandleCount
GetStdHandle
ExitProcess
ReadProcessMemory
HeapDestroy
VirtualAlloc
VirtualFree
DeleteCriticalSection
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetCurrentThreadId
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
RtlUnwind
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
WriteFile
IsDebuggerPresent
WriteConsoleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoA
GetVersionExA
GetCommandLineA
HeapReAlloc
CreateThread
ResumeThread
ExitThread
GetProcAddress
SetLastError
CreateFileA
FindResourceA
LoadResource
SizeofResource
LockResource
GetCurrentProcess
GetLastError
CloseHandle
LocalAlloc
LoadLibraryA
HeapCreate
LocalFree
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetEndOfFile
ReadFile
GetEnvironmentStringsW
user32
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
RegisterClassA
LoadMenuA
InsertMenuA
GetMessageA
PostQuitMessage
LoadStringA
DialogBoxParamA
GetSubMenu
EnableMenuItem
TrackPopupMenu
UpdateWindow
LoadAcceleratorsA
CreateMenu
DestroyIcon
SetDlgItemTextA
GetParent
ChildWindowFromPoint
InvalidateRect
SetCapture
ReleaseCapture
SetWindowLongA
GetWindowLongA
GetClientRect
CreateWindowExA
SetFocus
CallWindowProcA
GetSysColor
LoadIconA
DrawIconEx
InvalidateRgn
SetWindowPos
GetMenu
CheckMenuItem
SetTimer
KillTimer
GetWindowRect
IsIconic
IsZoomed
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetFocus
GetDC
DrawTextA
ReleaseDC
GetSystemMetrics
MoveWindow
ShowWindow
ClientToScreen
ScreenToClient
PostMessageA
DestroyWindow
DefWindowProcA
MessageBoxA
DialogBoxIndirectParamA
GetDlgItem
GetSysColorBrush
EndDialog
SetWindowTextA
LoadCursorA
SetCursor
InflateRect
SendMessageA
GetCursorPos
gdi32
CreateSolidBrush
EndDoc
EndPage
StartPage
StartDocA
SetMapMode
GetDeviceCaps
SetBkMode
SetTextColor
SelectObject
CreateFontIndirectA
GetObjectA
GetStockObject
GetTextExtentPoint32A
ExtTextOutA
SetBkColor
DeleteObject
GetTextMetricsA
CreateCompatibleDC
comdlg32
ChooseFontA
PrintDlgA
GetSaveFileNameA
advapi32
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
RegDeleteKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
shell32
ShellExecuteA
SHGetFileInfoA
Sections
.text Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ahkbvv Size: - Virtual size: 4KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 84KB - Virtual size: 81KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE