Static task
static1
Behavioral task
behavioral1
Sample
35a3345044b380466c1900958ec17e727fc487780682c14a337d90583945fbfe.exe
Resource
win7-20220812-en
General
-
Target
35a3345044b380466c1900958ec17e727fc487780682c14a337d90583945fbfe
-
Size
364KB
-
MD5
29b90f467a09f131a3049a2088751330
-
SHA1
75d16953703accbfa6c8efd3734659500c6076d7
-
SHA256
35a3345044b380466c1900958ec17e727fc487780682c14a337d90583945fbfe
-
SHA512
f64ac2c243ccc56ec6c036fe0841b7216716cc2fbbb087fcc3b115fd60c04a673ceb6b0557bdf2ab4ebee35355ddd561edd33371f42b984dedd82c143434923b
-
SSDEEP
6144:V3g541vDpxtuBUOKnNq2TBJYg/qzge9hTaPFViN3f8Mi1W3J1KH7T:VQ5ONxtuUOKNq2TrYgCHatViN3fniwZc
Malware Config
Signatures
Files
-
35a3345044b380466c1900958ec17e727fc487780682c14a337d90583945fbfe.exe windows x86
407d39887a273313c075d9922452d69f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dbghelp
MiniDumpWriteDump
wininet
HttpOpenRequestA
InternetConnectA
InternetSetOptionA
InternetWriteFile
InternetReadFile
HttpQueryInfoW
HttpSendRequestW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetConnectW
InternetOpenW
HttpEndRequestA
InternetCloseHandle
HttpAddRequestHeadersA
HttpSendRequestExA
InternetOpenA
rpcrt4
UuidCreate
iphlpapi
GetAdaptersInfo
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
kernel32
HeapAlloc
GetProcessHeap
HeapFree
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
GetCommandLineW
GetCurrentProcessId
GetCurrentThreadId
WaitForSingleObject
CloseHandle
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
WideCharToMultiByte
DeleteFileW
RemoveDirectoryW
GetLogicalDriveStringsW
QueryDosDeviceW
OpenProcess
GetProcessTimes
GetVersionExW
LoadLibraryA
GetProcAddress
FreeLibrary
SetCurrentDirectoryW
lstrlenW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
GetCurrentProcess
FlushInstructionCache
SetLastError
RaiseException
GetModuleHandleW
GetVolumeInformationA
GlobalAlloc
GlobalFree
CreateFileW
DeviceIoControl
MultiByteToWideChar
VirtualQueryEx
OpenFileMappingW
ReadProcessMemory
GetPrivateProfileStringW
WriteFile
GetLastError
GetFileSize
GetStringTypeW
FindClose
GetTimeZoneInformation
FindFirstFileW
lstrcpyW
FindNextFileW
GetTempPathW
FileTimeToSystemTime
SetErrorMode
GetDiskFreeSpaceExW
GlobalMemoryStatusEx
lstrlenA
GetComputerNameW
GetTickCount
FlushFileBuffers
CreateProcessW
SystemTimeToTzSpecificLocalTime
CompareStringW
lstrcmpiW
MulDiv
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InterlockedDecrement
InterlockedIncrement
GetCPInfo
RtlUnwind
HeapCreate
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
FindFirstFileExW
GetDriveTypeW
FileTimeToLocalFileTime
GetFileAttributesW
CreateThread
ExitThread
TlsAlloc
DecodePointer
EncodePointer
GetDateFormatW
GetTimeFormatW
GetSystemTimeAsFileTime
InterlockedPopEntrySList
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedCompareExchange
HeapSize
HeapReAlloc
HeapDestroy
Sleep
ReadFile
ExitProcess
GetACP
TlsGetValue
TlsSetValue
TlsFree
GetOEMCP
LCMapStringW
GetStdHandle
GetFileInformationByHandle
PeekNamedPipe
GetFileType
GetCurrentDirectoryW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
SetStdHandle
GetConsoleCP
GetConsoleMode
SetFilePointer
LoadLibraryW
SetEndOfFile
WriteConsoleW
SetEnvironmentVariableA
IsValidCodePage
GetFullPathNameW
CreateFileA
user32
EndDialog
CreateWindowExW
DestroyWindow
IsWindowVisible
LoadCursorW
GetClassNameW
RedrawWindow
CharNextW
SetRectEmpty
DrawIconEx
ScreenToClient
GetCursorPos
GetDlgCtrlID
ReleaseCapture
GetCapture
SetCapture
SetFocus
ShowWindow
GetWindow
MonitorFromWindow
SetCursor
DrawFocusRect
GetFocus
GetSysColor
IsWindowEnabled
UpdateWindow
MapWindowPoints
SetWindowPos
IsWindow
GetDC
ReleaseDC
GetClientRect
DrawTextW
OffsetRect
GetSystemMetrics
GetWindowRect
GetDlgItem
SetWindowTextW
GetWindowTextW
LoadImageW
LoadStringW
SetWindowLongW
GetWindowLongW
CallWindowProcW
DestroyIcon
DialogBoxParamW
DefWindowProcW
GetSysColorBrush
GetActiveWindow
InvalidateRect
GetWindowTextLengthW
EndPaint
GetParent
SendMessageW
FillRect
BeginPaint
GetMonitorInfoW
PtInRect
UnregisterClassA
LoadIconW
gdi32
DeleteObject
TextOutW
SelectObject
GetObjectW
GetStockObject
SetBkMode
CreateFontIndirectW
SetTextColor
advapi32
InitializeSecurityDescriptor
RegSetValueExW
RegCreateKeyExW
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
SetSecurityDescriptorDacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
CryptAcquireContextW
CryptCreateHash
CryptHashData
CryptDeriveKey
CryptDecrypt
CryptReleaseContext
GetUserNameW
shell32
ord165
SHGetFolderPathW
ShellExecuteW
ole32
CoCreateInstance
CoUninitialize
CoInitialize
oleaut32
SysAllocStringLen
SysAllocString
VarBstrCmp
SysFreeString
comctl32
_TrackMouseEvent
imm32
ImmDisableIME
psapi
GetModuleFileNameExW
EnumProcessModules
GetMappedFileNameW
GetProcessImageFileNameW
Sections
.text Size: 192KB - Virtual size: 191KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 81KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE