JustTempFun
Static task
static1
Behavioral task
behavioral1
Sample
34a8919cdc62b1138c92376541654d4535871f14d51712631dd6332294f0386e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
34a8919cdc62b1138c92376541654d4535871f14d51712631dd6332294f0386e.exe
Resource
win10v2004-20220812-en
General
-
Target
34a8919cdc62b1138c92376541654d4535871f14d51712631dd6332294f0386e
-
Size
132KB
-
MD5
07b977716c281f262192d40052fa5720
-
SHA1
9f1615d45bc6c48e1bfe983b39a33b3bc77c0cdd
-
SHA256
34a8919cdc62b1138c92376541654d4535871f14d51712631dd6332294f0386e
-
SHA512
a0ccf2093b09ccec77a1232a80b758a0c2ccd7c58d2bbd5e9d894b4dd5a4ea713c3da983f1a2e715caec4db2e332f9ad537313d32c110662f4438fe5b9bcae1f
-
SSDEEP
3072:kx8ilKCALtWIt5OIEoKudRsBMDwNPuQJYOCSFj/ta:WllALtWIDOIMIw1PJYfSFzta
Malware Config
Signatures
Files
-
34a8919cdc62b1138c92376541654d4535871f14d51712631dd6332294f0386e.exe windows x86
cae781e1f25be83fd80f560659c32c93
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetProcessHeap
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetTickCount
LocalSize
OutputDebugStringA
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
SetLastError
PeekNamedPipe
WaitForMultipleObjects
GlobalMemoryStatusEx
GetSystemInfo
OpenEventA
SetErrorMode
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
GetModuleHandleA
HeapFree
GetLocalTime
GetSystemDirectoryA
GetModuleFileNameA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
OpenProcess
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrlenA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
GetFileAttributesA
LoadLibraryA
GetProcAddress
Sleep
CreateEventA
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
Beep
DeviceIoControl
GetVersion
GetCurrentProcess
RemoveDirectoryA
ExitProcess
TerminateThread
CloseHandle
TerminateProcess
user32
DestroyCursor
BlockInput
SystemParametersInfoA
keybd_event
MapVirtualKeyA
mouse_event
SetCapture
WindowFromPoint
SetCursorPos
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
LoadCursorA
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorPos
GetCursorInfo
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CloseDesktop
SetThreadDesktop
IsWindow
CloseWindow
CreateWindowExA
DispatchMessageA
GetKeyState
GetAsyncKeyState
GetWindowTextA
SwapMouseButton
TranslateMessage
SendMessageA
GetForegroundWindow
GetWindowRect
MoveWindow
FindWindowA
ShowWindow
ExitWindowsEx
GetMessageA
wsprintfA
MessageBoxA
CharNextA
GetSystemMetrics
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
gdi32
DeleteObject
BitBlt
CreateDIBSection
SelectObject
CreateCompatibleBitmap
GetDIBits
CreateCompatibleDC
DeleteDC
advapi32
BuildExplicitAccessWithNameA
IsValidSid
OpenProcessToken
LsaOpenPolicy
LsaFreeMemory
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
SetNamedSecurityInfoA
GetNamedSecurityInfoA
SetEntriesInAclA
RegQueryValueExA
RegOpenKeyA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
StartServiceA
QueryServiceConfigA
EnumServicesStatusA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
LookupAccountSidA
GetTokenInformation
LookupAccountNameA
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
shlwapi
SHDeleteKeyA
msvcrt
_stricmp
_strnicmp
_adjust_fdiv
_strrev
_controlfp
__set_app_type
__p__fmode
__p__commode
_strcmpi
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_beginthreadex
realloc
strncat
_snprintf
wcscpy
_errno
strchr
strncmp
atoi
strncpy
strcat
strrchr
malloc
free
strcmp
_except_handler3
strcpy
memcmp
strstr
strlen
_ftol
ceil
memmove
__CxxFrameHandler
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
memset
winmm
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveInAddBuffer
waveOutOpen
waveOutGetNumDevs
mciSendStringA
waveInStart
waveOutWrite
waveOutClose
waveOutUnprepareHeader
waveOutReset
waveInClose
waveInStop
waveOutPrepareHeader
waveInReset
waveInUnprepareHeader
ws2_32
WSAIoctl
WSAStartup
setsockopt
htons
gethostbyname
socket
ntohs
gethostname
ioctlsocket
__WSAFDIsSet
recvfrom
sendto
listen
accept
getpeername
bind
getsockname
inet_addr
inet_ntoa
send
select
closesocket
connect
recv
WSACleanup
userenv
GetProfilesDirectoryA
CreateEnvironmentBlock
GetUserProfileDirectoryA
msvcp60
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
netapi32
NetLocalGroupAddMembers
NetUserAdd
wininet
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetReadFile
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
msvfw32
ICSendMessage
ICSeqCompressFrameEnd
ICCompressorFree
ICClose
ICOpen
ICSeqCompressFrameStart
ICSeqCompressFrame
wtsapi32
WTSFreeMemory
WTSQueryUserToken
WTSQuerySessionInformationA
psapi
GetModuleFileNameExA
EnumProcessModules
Exports
Exports
Sections
.text Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ