Static task
static1
Behavioral task
behavioral1
Sample
34a427b852349a31c60ed7b34b7a5925e0ea911f6f52f57aa4e806390fc3470e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
34a427b852349a31c60ed7b34b7a5925e0ea911f6f52f57aa4e806390fc3470e.exe
Resource
win10v2004-20220812-en
General
-
Target
34a427b852349a31c60ed7b34b7a5925e0ea911f6f52f57aa4e806390fc3470e
-
Size
928KB
-
MD5
b3bff70467015839fab7c973e09ae8f1
-
SHA1
9ed8f846f4c2d5153424ec2924fac24a2b96c921
-
SHA256
34a427b852349a31c60ed7b34b7a5925e0ea911f6f52f57aa4e806390fc3470e
-
SHA512
49dac2bd871f4d32e674cd1cfbf4f9e6cb10d44411bbdc35aaf0689905639d74df6c7e9181b37c3c092762c77353d8fcaae5e22579615b7197ba71a3e5ea68a0
-
SSDEEP
12288:W89fzz8lSL2DV9g8xt/HLN/u28R4l9HV/nI6LEG2TaCqMGoW4:W8lz8lSL2R9pxtjN/ulKbV/OTaCn
Malware Config
Signatures
Files
-
34a427b852349a31c60ed7b34b7a5925e0ea911f6f52f57aa4e806390fc3470e.exe windows x86
5841617eef093c167a0f5c7c620b4b6e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlUnwind
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
TerminateProcess
GetStartupInfoA
HeapReAlloc
ExitThread
CreateThread
SetStdHandle
GetFileType
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
QueryPerformanceCounter
GetCurrentProcessId
SetUnhandledExceptionFilter
GetTimeZoneInformation
ExitProcess
GetStringTypeW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
LCMapStringA
LCMapStringW
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
HeapAlloc
Process32Next
SetErrorMode
GetOEMCP
GetCPInfo
GetFileTime
GetFileAttributesA
GlobalFlags
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalMemoryStatus
OpenProcess
VirtualQueryEx
GetProcessHeap
RaiseException
GlobalGetAtomNameA
GlobalFindAtomA
lstrcatA
lstrcmpW
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
GlobalAddAtomA
FreeResource
WaitForSingleObject
GetCurrentThread
GetCurrentThreadId
FreeLibrary
GlobalDeleteAtom
lstrcmpA
GetModuleHandleA
GetProcAddress
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
LoadLibraryA
SetLastError
MulDiv
GlobalLock
GlobalUnlock
FormatMessageA
lstrcpynA
LocalFree
GetLocalTime
WritePrivateProfileStringA
InitializeCriticalSection
GetPrivateProfileStringA
GetPrivateProfileIntA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SizeofResource
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetFileSize
GlobalAlloc
ReadFile
GlobalFree
FindResourceA
LoadResource
LockResource
InterlockedDecrement
InterlockedIncrement
GetTickCount
GetModuleFileNameA
CreateFileA
WriteFile
GetTempPathA
DeleteFileA
GetCommandLineA
Sleep
CopyFileA
CreateProcessA
CreateToolhelp32Snapshot
Process32First
Module32First
Module32Next
CloseHandle
GetStringTypeA
user32
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
InvalidateRect
CopyAcceleratorTableA
SetRect
IsRectEmpty
CharNextA
ReleaseCapture
SetCapture
LoadCursorA
GetSysColorBrush
RegisterClipboardFormatA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
IsChild
GetForegroundWindow
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetMenu
AdjustWindowRectEx
EqualRect
GetClassInfoA
RegisterClassA
UnregisterClassA
DefWindowProcA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
PtInRect
GetWindowTextA
SetFocus
ShowWindow
MoveWindow
SetWindowLongA
GetDlgCtrlID
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
SetDlgItemInt
SendDlgItemMessageA
GetDlgItemInt
UnhookWindowsHookEx
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
wsprintfA
SetMenuItemBitmaps
GetFocus
GetProcessWindowStation
GetUserObjectInformationW
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetLastActivePopup
DestroyMenu
PostThreadMessageA
SetCursor
CopyRect
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
GetWindowTextLengthA
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
PostQuitMessage
PostMessageA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetSystemMetrics
EnableWindow
LoadIconA
KillTimer
SetTimer
RedrawWindow
IsWindowVisible
UpdateWindow
GetClientRect
GetWindowRect
IsIconic
SendMessageA
DrawIcon
CharUpperA
MessageBoxA
CallWindowProcA
gdi32
GetMapMode
GetBkColor
GetTextColor
GetRgnBox
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
CreateRectRgnIndirect
CreateDIBSection
SetDIBColorTable
SetViewportExtEx
CreateSolidBrush
GetStockObject
CreateCompatibleDC
CreateBitmap
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
CreateFontIndirectA
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetPixel
BitBlt
GetWindowExtEx
GetViewportExtEx
GetObjectA
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
ScaleViewportExtEx
comdlg32
GetOpenFileNameA
GetFileTitleA
GetSaveFileNameA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
advapi32
ReportEventA
DeregisterEventSource
RegCloseKey
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
RegisterEventSourceA
RegSetValueExA
RegCreateKeyExA
shell32
ShellExecuteA
DragQueryFileA
comctl32
ord17
ImageList_Destroy
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
UrlUnescapeA
PathFindExtensionA
oledlg
ord8
ole32
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
OleInitialize
CoTaskMemFree
CoCreateInstance
OleRun
CreateStreamOnHGlobal
CoFreeUnusedLibraries
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
OleUninitialize
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
oleaut32
VariantCopy
GetErrorInfo
OleCreateFontIndirect
SystemTimeToVariantTime
SysAllocStringLen
VariantChangeType
SafeArrayDestroy
VariantClear
SafeArrayPutElement
SafeArrayCreate
SafeArrayCreateVector
SysAllocString
SysAllocStringByteLen
SysStringByteLen
SysStringLen
VariantInit
SysFreeString
ws2_32
WSAStartup
WSAGetLastError
WSACleanup
htons
socket
closesocket
send
recv
ioctlsocket
connect
select
gethostbyname
inet_addr
shutdown
ntohl
wininet
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetConnectA
HttpSendRequestA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetQueryDataAvailable
InternetSetOptionExA
InternetCanonicalizeUrlA
InternetCrackUrlA
rasapi32
RasHangUpA
RasEnumConnectionsA
RasGetConnectStatusA
RasDialA
RasEnumEntriesA
gdiplus
GdipCloneImage
GdipAlloc
GdipDrawImageI
GdipGetImageGraphicsContext
GdipFree
GdiplusShutdown
GdiplusStartup
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromHBITMAP
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipDeleteGraphics
GdipDisposeImage
GdipSaveImageToStream
GdipGetImageWidth
GdipGetImageHeight
GdipGetImagePixelFormat
GdipGetImagePaletteSize
GdipGetImagePalette
GdipCreateBitmapFromScan0
Sections
.text Size: 368KB - Virtual size: 365KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 100KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.res0 Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 372KB - Virtual size: 371KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ