Static task
static1
Behavioral task
behavioral1
Sample
354ff142d5ee79b2f0658964173fd9be6b5e9229d68a429cb623b6291075aaaa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
354ff142d5ee79b2f0658964173fd9be6b5e9229d68a429cb623b6291075aaaa.exe
Resource
win10v2004-20220812-en
General
-
Target
354ff142d5ee79b2f0658964173fd9be6b5e9229d68a429cb623b6291075aaaa
-
Size
151KB
-
MD5
357fc1fbd429bba4764d26973b7447c0
-
SHA1
cdbb92da7c60bb0473a6c86dd1a5e7bba832ec82
-
SHA256
354ff142d5ee79b2f0658964173fd9be6b5e9229d68a429cb623b6291075aaaa
-
SHA512
e369318510b8199e80c0b0eff16a72739124dbfd7cf8c3b881b55ee7a7f0cb8db359bfd74eb715f43afe751634797d55e5925b3a6b9dda0a76df38c5abe32033
-
SSDEEP
3072:lfKRlVTSzygGFxyc+Vb5p5e6/o3xjvbD57f8f:NKbwG5xyLVp5e6/qJv5f8
Malware Config
Signatures
Files
-
354ff142d5ee79b2f0658964173fd9be6b5e9229d68a429cb623b6291075aaaa.exe windows x86
705a7dc174241dfe83b5f41d57e6232d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
recv
closesocket
WSAStartup
socket
WSACleanup
setsockopt
gethostbyname
inet_ntoa
inet_addr
htons
connect
send
gdi32
RectVisible
GetStockObject
GetMapMode
SetMapMode
LPtoDP
GetDeviceCaps
DPtoLP
SetColorAdjustment
kernel32
GetStringTypeW
SetEndOfFile
GetStringTypeA
Process32Next
CloseHandle
TerminateProcess
OpenProcess
Process32First
CreateToolhelp32Snapshot
CreateProcessA
WaitForSingleObject
CreateEventA
ChangeTimerQueueTimer
SetPriorityClass
DeviceIoControl
GetVolumePathNameA
SwitchToFiber
MulDiv
GetModuleFileNameA
Sleep
GlobalFree
GlobalUnlock
GlobalLock
GetProcessHeap
ReadFile
GetFileSize
CreateFileA
GetModuleHandleA
GetTickCount
GetTempPathA
GetEnvironmentVariableA
CopyFileA
SetFileAttributesA
GetCommandLineA
SetEvent
CreateThread
GetLocaleInfoA
LCMapStringW
LCMapStringA
GetTimeZoneInformation
MultiByteToWideChar
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
InitializeCriticalSectionAndSpinCount
LoadLibraryA
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalAlloc
CreateDirectoryA
GetCurrentDirectoryA
GetFullPathNameA
GetSystemTimeAsFileTime
GetLastError
HeapFree
HeapAlloc
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
GetModuleHandleW
GetProcAddress
ExitProcess
GetStartupInfoA
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
WriteFile
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
SetHandleCount
GetFileType
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
user32
InvalidateRect
ReplyMessage
MessageBoxA
LoadCursorA
RegisterClassExA
ShowWindow
GetMessageA
TranslateMessage
DispatchMessageA
PostQuitMessage
GetTitleBarInfo
GetDesktopWindow
GetWindowRect
MoveWindow
CreateWindowExA
BeginPaint
EndPaint
DefWindowProcA
SetFocus
GetWindowTextLengthA
UpdateWindow
GetWindowDC
SetWindowTextA
CreateIconFromResourceEx
advapi32
RegSetValueExA
RegCloseKey
FindFirstFreeAce
RegOpenKeyA
ole32
CreateStreamOnHGlobal
oleaut32
OleLoadPicture
Sections
.text Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE