Static task
static1
Behavioral task
behavioral1
Sample
34dbcccd9b4361b497e5236ecd15a9775ba9410a8bee4534ae10c4b20dce8534.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
34dbcccd9b4361b497e5236ecd15a9775ba9410a8bee4534ae10c4b20dce8534.exe
Resource
win10v2004-20220901-en
General
-
Target
34dbcccd9b4361b497e5236ecd15a9775ba9410a8bee4534ae10c4b20dce8534
-
Size
723KB
-
MD5
a02d917d58da696bd058eef3f65c0d33
-
SHA1
2a66acb49a686fb7302d2d1290e4c5a46c06d3b6
-
SHA256
34dbcccd9b4361b497e5236ecd15a9775ba9410a8bee4534ae10c4b20dce8534
-
SHA512
9dfd2d40574888369e155007ac20f007672a7a40dbe5363a812212147b572d4e2959a8475af42943d828d7d929807c603a9e774a9458b1b85668657c713d8d84
-
SSDEEP
12288:C8LHFgjNkErR7vl6G7qEDZ5ZFqF9BFjmhNs:C8DEiErmGhZ5cdd
Malware Config
Signatures
Files
-
34dbcccd9b4361b497e5236ecd15a9775ba9410a8bee4534ae10c4b20dce8534.exe windows x86
dfbcec5d097db02b92605831fbdbcf4e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
ChooseColorA
PageSetupDlgW
shell32
DragFinish
SHChangeNotify
DragQueryPoint
DragAcceptFiles
ole32
MkParseDisplayName
OleIsRunning
kernel32
TryEnterCriticalSection
SetTimeZoneInformation
GetFullPathNameA
GetFileType
FindNextChangeNotification
SuspendThread
SetEndOfFile
GetPrivateProfileStringA
DuplicateHandle
GetModuleFileNameW
ReadConsoleOutputA
GetACP
FatalAppExitA
SetConsoleWindowInfo
GetProfileIntA
CloseHandle
GetFileInformationByHandle
GetUserDefaultLCID
GetTempFileNameA
VirtualProtect
GetVersion
LocalLock
GetConsoleCursorInfo
GetCommState
CreateFileW
GenerateConsoleCtrlEvent
GlobalFindAtomW
GetPrivateProfileStringW
LocalFileTimeToFileTime
DebugBreak
GlobalReAlloc
ReadDirectoryChangesW
SizeofResource
RemoveDirectoryW
GetTimeZoneInformation
GetFileAttributesExA
EnumCalendarInfoA
VirtualLock
SetFileAttributesA
GetShortPathNameW
ReadConsoleInputW
SetStdHandle
GetSystemTime
SetEvent
FindFirstFileA
IsBadReadPtr
EnumResourceLanguagesW
WaitNamedPipeA
GetShortPathNameA
ExitProcess
WritePrivateProfileSectionW
advapi32
SetFileSecurityW
GetUserNameA
RegRestoreKeyW
StartServiceCtrlDispatcherA
ReportEventA
ChangeServiceConfigW
CloseEventLog
SetNamedSecurityInfoA
StartServiceCtrlDispatcherW
GetSidSubAuthority
SetSecurityDescriptorSacl
CryptCreateHash
LogonUserW
InitiateSystemShutdownW
CryptVerifySignatureA
CreatePrivateObjectSecurity
user32
MapVirtualKeyW
FlashWindowEx
RegisterClassW
MessageBoxExA
SetDlgItemTextA
GetMenuItemCount
GetWindowContextHelpId
IsDialogMessageW
ClientToScreen
TabbedTextOutW
IntersectRect
UnregisterClassW
CreateIcon
GetQueueStatus
CopyRect
GetDlgItem
InsertMenuItemW
InvalidateRgn
HideCaret
GetClipboardViewer
PeekMessageA
EnumDisplaySettingsExA
SetWindowRgn
MsgWaitForMultipleObjectsEx
WinHelpW
OemToCharBuffW
SendInput
LoadImageW
EndMenu
SetClipboardData
GetTitleBarInfo
GetTabbedTextExtentA
msvcrt
_wmakepath
towlower
fprintf
wcstok
_mbsdec
_wgetcwd
__doserrno
strtod
toupper
iswspace
_eof
_wcsnset
_flushall
_unlink
_lseek
_read
_mbsnbicmp
strpbrk
_waccess
fscanf
_itoa
Sections
.text Size: 317KB - Virtual size: 316KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 386KB - Virtual size: 385KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ