Static task
static1
Behavioral task
behavioral1
Sample
34e701767a1f411a93e8b5e5123b53adfd51d8d78c8e35e693c31a64e146b592.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
34e701767a1f411a93e8b5e5123b53adfd51d8d78c8e35e693c31a64e146b592.exe
Resource
win10v2004-20220812-en
General
-
Target
34e701767a1f411a93e8b5e5123b53adfd51d8d78c8e35e693c31a64e146b592
-
Size
240KB
-
MD5
66e6afab3327eb99cbf63ea75a70d9f0
-
SHA1
7b9158a5f388ab5ac2a48abe6f9446db46e148f7
-
SHA256
34e701767a1f411a93e8b5e5123b53adfd51d8d78c8e35e693c31a64e146b592
-
SHA512
ef26177b9fb74e0c8813e2e9aac3835fa6c2469f88a8347b3c52c72fd8b15f664daf70e80907ecd857ffe41eb9212c20bd390f12c3ef5851ac1510d03e28c47d
-
SSDEEP
6144:YB5bkKms7hUEZjjthlP/W+8QjRb8JgZNMa0fU:YXZD6wXb8J4SHfU
Malware Config
Signatures
Files
-
34e701767a1f411a93e8b5e5123b53adfd51d8d78c8e35e693c31a64e146b592.exe windows x86
69d110c0384399f7f221eedaeec0564a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_fileno
_lsearch
_lrotl
_osplatform
_mbccpy
_strrev
?unexpected@@YAXXZ
_write
swprintf
wcsxfrm
_spawnlpe
_wremove
_dup
_getdrive
wcslen
??_U@YAPAXI@Z
_wexeclpe
memset
_memicmp
fflush
_rmdir
_wputenv
_set_sbh_threshold
?_query_new_handler@@YAP6AHI@ZXZ
__p__commode
_ltoa
_isctype
_wcsnicmp
__getmainargs
__p___argc
_ismbbkpunct
_fstat
__RTCastToVoid
__p___initenv
?_set_new_mode@@YAHH@Z
_mbsrchr
_wcsset
iswcntrl
ferror
??0bad_cast@@QAE@ABV0@@Z
tmpnam
_wspawnl
__CxxExceptionFilter
_telli64
_mbsdec
exit
_adj_fdiv_m32
_endthreadex
_fsopen
??0bad_typeid@@QAE@ABV0@@Z
__set_app_type
abort
_mkdir
msacm32
acmFilterDetailsW
acmFormatTagEnumW
acmMessage32
acmFilterTagDetailsW
acmStreamConvert
acmDriverPriority
acmFilterDetailsA
acmFilterEnumW
acmFormatEnumW
acmStreamUnprepareHeader
acmStreamClose
acmDriverDetailsA
acmStreamSize
acmDriverClose
acmFormatDetailsW
acmFormatSuggest
acmFormatEnumA
acmDriverMessage
msls31
LsdnFinishBySubline
LsdnSubmitSublines
LssbGetDupSubline
LsQueryLineDup
LsdnGetDup
LsGetSpecialEffectsSubline
LsForceBreakSubline
LsSetBreaking
LsGetLineDur
LsdnSkipCurTab
LsdnFinishDelete
LsCompressSubline
dsauth
StoreCleanupHandle
DhcpDsInitDS
DhcpDsGetAttribs
DhcpDeleteServerDS
DhcpDsGetRoot
StoreEndSearch
DhcpDsAddServer
StoreSearchGetNext
DhcpDsEnumServers
DhcpEnumServersDS
StoreSetSearchOneLevel
StoreInitHandle
softpub
SoftpubLoadDefUsageCallData
SoftpubLoadSignature
SoftpubLoadMessage
SoftpubInitialize
HTTPSFinalProv
SoftpubCheckCert
AddPersonalTrustDBPages
SoftpubAuthenticode
GenericChainFinalProv
DriverInitializePolicy
OpenPersonalTrustDBDialog
OfficeInitializePolicy
DriverCleanupPolicy
SoftpubDefCertInit
GenericChainCertificateTrust
DllRegisterServer
OfficeCleanupPolicy
kernel32
SetLastError
GetConsoleHardwareState
GetModuleFileNameA
GetTickCount
CreateNamedPipeA
UTRegister
GetUserDefaultLCID
GlobalHandle
CreateFileMappingA
IsDBCSLeadByteEx
SetThreadPriority
GlobalMemoryStatus
GetPrivateProfileSectionNamesA
OpenProcess
SetDefaultCommConfigA
LoadLibraryW
FreeLibraryAndExitThread
GetNumaNodeProcessorMask
hhsetup
?FindTitle@CCollection@@QAEPAVCTitle@@PBDG@Z
??0CLocation@@QAE@XZ
?GetVisableRootFolder@CCollection@@QAEPAVCFolder@@XZ
?SetTitle@CLocation@@QAEXPBG@Z
?ParseFile@CCollection@@AAEKPBD@Z
?Next@CPointerList@@QAEPAUListItem@@PAU2@@Z
??1CTitle@@QAE@XZ
?DeleteTitle@CCollection@@AAEKPAVCTitle@@@Z
?GetFindMergedCHMS@CCollection@@QAEHXZ
?GetParent@CFolder@@QAEPAV1@XZ
?SetFirstChildFolder@CFolder@@QAEXPAV1@@Z
?Release@CCollection@@AAEKXZ
?GetNextTitle@CTitle@@QAEPAV1@XZ
?DeleteFolder@CCollection@@QAEKPAVCFolder@@@Z
??0CPointerList@@QAE@XZ
?FindLocation@CCollection@@QAEPAVCLocation@@PBGPAI@Z
?NewLocationHistory@CTitle@@QAEPAULocationHistory@@XZ
?ConfirmTitles@CCollection@@QAEXXZ
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 137KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ