Static task
static1
Behavioral task
behavioral1
Sample
35b3fe2331a4a7d83d203e75ece5189b7d6d06af4abac8906348c0720b6278a4_unpacked.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
35b3fe2331a4a7d83d203e75ece5189b7d6d06af4abac8906348c0720b6278a4_unpacked.exe
Resource
win10v2004-20220812-en
General
-
Target
35b3fe2331a4a7d83d203e75ece5189b7d6d06af4abac8906348c0720b6278a4_unpacked
-
Size
116KB
-
MD5
9301564bdd572b0773f105287d8837c4
-
SHA1
2404f78c3463aa71a4fecec73590fcdc7f5b75a5
-
SHA256
35b3fe2331a4a7d83d203e75ece5189b7d6d06af4abac8906348c0720b6278a4
-
SHA512
5aa99a6df5d40634c0e62cf12ed44e15d3ecd57ee3698a34053c1f9dc6c8fadd311ec733fb838fb1adb528ec1bef17fd32f98f2526055ac67767233c17f7d33e
-
SSDEEP
3072:GrwexMLdyhvxuIu8k8K36tGP3z1A4DeiUnFC0bS1GweRsqucJEy:GrbC0+ntric5Dx6bJm
Malware Config
Signatures
Files
-
35b3fe2331a4a7d83d203e75ece5189b7d6d06af4abac8906348c0720b6278a4_unpacked.exe windows x86
a2decf2bc911143b355314de8c24580c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
LocalFree
FlushFileBuffers
HeapFree
CreateFileW
HeapAlloc
GetProcessHeap
lstrcmpA
GetLastError
HeapReAlloc
GetLocalTime
lstrlenW
GetModuleFileNameW
GetTempPathW
CopyFileW
GetTickCount
LoadLibraryA
CreateFileA
ReadProcessMemory
WriteProcessMemory
TerminateProcess
WaitForSingleObject
ResumeThread
GetModuleHandleA
GetThreadContext
VirtualAllocEx
CreateProcessA
SetThreadContext
GetStartupInfoW
CreateProcessW
GetCurrentProcess
lstrcpynW
Sleep
GetNativeSystemInfo
ExitProcess
DecodePointer
GetConsoleMode
LocalAlloc
lstrlenA
WriteFile
GetProcAddress
GetSystemTime
GetConsoleCP
HeapSize
SetFilePointerEx
LCMapStringW
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
WriteConsoleW
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
GetFileType
GetModuleHandleExW
GetStdHandle
RaiseException
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetModuleHandleW
RtlUnwind
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
user32
wvsprintfA
advapi32
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
shell32
ShellExecuteW
SHGetFolderPathW
SHGetFolderPathAndSubDirW
shlwapi
StrRChrA
PathAppendW
StrStrNW
PathFindFileNameW
PathQuoteSpacesW
wininet
InternetReadFile
InternetConnectA
HttpSendRequestA
InternetCloseHandle
InternetOpenA
HttpAddRequestHeadersA
HttpQueryInfoA
InternetCrackUrlA
HttpOpenRequestA
InternetQueryDataAvailable
InternetSetOptionA
urlmon
ObtainUserAgentString
ws2_32
htons
recvfrom
ntohs
socket
inet_pton
shutdown
select
closesocket
__WSAFDIsSet
sendto
Sections
.text Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ