Static task
static1
Behavioral task
behavioral1
Sample
35c0c8f92004400af81ebc71a2093249c15a9641560bc55b19595676a9c1c8b6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
35c0c8f92004400af81ebc71a2093249c15a9641560bc55b19595676a9c1c8b6.exe
Resource
win10v2004-20220812-en
General
-
Target
35c0c8f92004400af81ebc71a2093249c15a9641560bc55b19595676a9c1c8b6
-
Size
572KB
-
MD5
960260a8ac7fe167e260b949ff853c06
-
SHA1
dfbaea16c0355bbbb6ddca268ee2cb90d90e2433
-
SHA256
35c0c8f92004400af81ebc71a2093249c15a9641560bc55b19595676a9c1c8b6
-
SHA512
c4a4c771b1f4ab21b1d3a97f82b68f3e96d3774ced0ac1edbae6e8d91c676e80c57d451161eb5824fe56460bf941871a4bc386f0bd23ffd5253f9cd281878ddc
-
SSDEEP
12288:SkctvMEzCD2fy3RheFzc+/gAgDlU3gFenXJ+BX2f:2iU8hGj/gD2uenXu2f
Malware Config
Signatures
Files
-
35c0c8f92004400af81ebc71a2093249c15a9641560bc55b19595676a9c1c8b6.exe windows x86
4bbdc058239e33198048e9df0ef17973
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxExA
CharUpperBuffA
SetClassLongA
CopyRect
ShowWindowAsync
SetMessageQueue
RegisterClassExA
DestroyWindow
CharUpperW
BeginDeferWindowPos
GetMenuCheckMarkDimensions
MessageBeep
DefWindowProcA
LoadAcceleratorsA
ShowWindow
MessageBoxA
wsprintfW
GetDlgItemInt
GetProcessDefaultLayout
GetInputDesktop
SetLastErrorEx
LoadMenuA
IsDialogMessage
LookupIconIdFromDirectoryEx
CreateWindowExW
DdeImpersonateClient
RegisterClassA
SendNotifyMessageA
CreateIconFromResourceEx
RegisterHotKey
gdi32
ResetDCA
GetKerningPairsW
CreateCompatibleDC
AddFontResourceA
Polygon
EndPage
StartDocW
PathToRegion
GetTextExtentExPointW
GetNearestColor
shell32
SHAppBarMessage
ExtractAssociatedIconW
SHQueryRecycleBinW
SHGetMalloc
ShellExecuteA
comctl32
InitCommonControlsEx
ImageList_AddIcon
kernel32
GetModuleHandleA
GetOEMCP
LeaveCriticalSection
DeleteCriticalSection
FreeEnvironmentStringsA
WriteFile
GetCurrentProcessId
GetCurrentProcess
TlsGetValue
IsValidLocale
SetFilePointer
TlsAlloc
GetDiskFreeSpaceA
VirtualQuery
HeapDestroy
GetSystemInfo
FlushFileBuffers
GetDateFormatA
HeapFree
GetTickCount
EnterCriticalSection
WideCharToMultiByte
HeapCreate
GetCurrentThreadId
OpenMutexA
FindFirstFileExW
TlsFree
GetLocaleInfoW
LoadLibraryExW
ReadFile
LCMapStringW
SetConsoleOutputCP
GetCPInfo
LoadLibraryA
SetEnvironmentVariableA
SetLastError
GetStartupInfoA
GetStdHandle
HeapAlloc
GetProcAddress
GetSystemDefaultLCID
SetHandleCount
RtlUnwind
IsBadWritePtr
TlsSetValue
InterlockedExchange
GetTimeFormatA
GetCurrentThread
IsValidCodePage
CompareStringW
GetLastError
GetEnvironmentStrings
HeapSize
GetSystemTimeAsFileTime
CreateMutexA
TerminateProcess
GetTimeZoneInformation
VirtualFree
GetACP
GetVersionExA
LCMapStringA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
GetConsoleCP
SetStdHandle
VirtualProtect
GetFileType
CreateFileMappingA
VirtualAlloc
ExitProcess
UnhandledExceptionFilter
QueryPerformanceCounter
GetCommandLineA
InitializeCriticalSection
GetEnvironmentStringsW
CompareStringA
HeapReAlloc
MultiByteToWideChar
FreeEnvironmentStringsW
MoveFileExA
GetStringTypeA
CloseHandle
GetLocaleInfoA
GetModuleFileNameA
Sections
.text Size: 172KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 264KB - Virtual size: 263KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ