Static task
static1
Behavioral task
behavioral1
Sample
350e7cd6086799717fadb315d233e4abdd30719d928d14b57e7602fcc54c3825.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
350e7cd6086799717fadb315d233e4abdd30719d928d14b57e7602fcc54c3825.exe
Resource
win10v2004-20220901-en
General
-
Target
350e7cd6086799717fadb315d233e4abdd30719d928d14b57e7602fcc54c3825
-
Size
196KB
-
MD5
9076759e276505ae6316b0870f994660
-
SHA1
b3a100b536d58b6b2a635d28c921fb1cb5bf026c
-
SHA256
350e7cd6086799717fadb315d233e4abdd30719d928d14b57e7602fcc54c3825
-
SHA512
e0150722d24b7fa9175c72fa3222c69bed860d2fbfdc02434e27b66c2cf2ec9f96fd4f2aeda898286f82e321038be2ed47d7ecf37036c98a3ef9c74be51f68c7
-
SSDEEP
6144:JPY0Yb3S9JNzgQ0TLP/f31Oc9quIDSsQLH5Aj/:JPBYb3S9DzgNPnCJDSsPj/
Malware Config
Signatures
Files
-
350e7cd6086799717fadb315d233e4abdd30719d928d14b57e7602fcc54c3825.exe windows x86
587bf289dd658d21158b8ea871ae75d6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalLock
GlobalUnlock
SizeofResource
FreeLibrary
FindResourceW
GetModuleHandleW
MultiByteToWideChar
lstrcmpiW
LoadResource
LoadLibraryExW
SetUnhandledExceptionFilter
LoadLibraryW
GetProcAddress
CreateFileW
GetCurrentProcessId
CloseHandle
GetSystemTimeAsFileTime
GetModuleFileNameW
QueryPerformanceCounter
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
lstrlenW
GetCurrentProcess
DeleteCriticalSection
FlushInstructionCache
InitializeCriticalSection
GetLastError
InterlockedDecrement
LeaveCriticalSection
GetCurrentThreadId
FindFirstFileW
InterlockedIncrement
EnterCriticalSection
RaiseException
GlobalAlloc
MulDiv
SetLastError
lstrcmpW
Sleep
FindClose
GetTickCount
user32
CreateWindowExW
CharNextW
LoadCursorW
UnregisterClassA
ReleaseDC
RegisterClassExW
DestroyWindow
GetSysColor
GetCursorPos
LoadMenuW
PostQuitMessage
GetWindowTextLengthW
GetClassNameW
CreateAcceleratorTableW
ReleaseCapture
RedrawWindow
SetTimer
GetWindow
KillTimer
CallWindowProcW
IsChild
MoveWindow
GetParent
SetWindowPos
SetCapture
SetFocus
GetDlgItem
GetWindowRect
DestroyAcceleratorTable
GetClientRect
GetFocus
LoadAcceleratorsW
UpdateWindow
DispatchMessageW
GetMessageW
LoadStringW
TranslateMessage
LoadIconW
TranslateAcceleratorW
SetLayeredWindowAttributes
GetClassInfoExW
GetDC
RegisterWindowMessageW
EndPaint
BeginPaint
GetWindowLongW
ScreenToClient
SetWindowLongW
ClientToScreen
FillRect
DefWindowProcW
IsWindow
GetWindowTextW
SetForegroundWindow
SetWindowTextW
DestroyMenu
InvalidateRgn
TrackPopupMenu
GetSubMenu
GetDesktopWindow
InvalidateRect
SendMessageW
gdi32
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
CreateSolidBrush
DeleteObject
SelectObject
GetDeviceCaps
GetObjectW
DeleteDC
GetStockObject
advapi32
RegOpenKeyExW
RegCreateKeyExW
RegEnumKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegQueryInfoKeyW
RegSetValueExW
ole32
CoTaskMemAlloc
OleLockRunning
StringFromGUID2
CreateStreamOnHGlobal
OleInitialize
CoTaskMemFree
CoUninitialize
CoTaskMemRealloc
CoInitialize
CoCreateInstance
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
OleUninitialize
oleaut32
SysAllocStringLen
GetErrorInfo
VarUI4FromStr
VariantClear
VariantInit
SysStringByteLen
SysStringLen
LoadTypeLi
LoadRegTypeLi
SysFreeString
SysAllocString
OleCreateFontIndirect
msvcr80
memcmp
_controlfp_s
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_except_handler4_common
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
_XcptFilter
_exit
_cexit
__wgetmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
?terminate@@YAXXZ
_CxxThrowException
wcscpy_s
wcsrchr
_wcsdup
_wtoi64
wcsncpy_s
memcpy_s
??2@YAPAXI@Z
memset
_purecall
free
exit
malloc
swprintf_s
_recalloc
??_V@YAXPAX@Z
??_U@YAPAXI@Z
__CxxFrameHandler3
??3@YAXPAX@Z
Sections
.text Size: 76KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ