Static task
static1
Behavioral task
behavioral1
Sample
351bb8ef093fa2cc551957bc1b2c7f6633d1f0dad4b682b45f63032af320c1f8.exe
Resource
win7-20221111-en
General
-
Target
351bb8ef093fa2cc551957bc1b2c7f6633d1f0dad4b682b45f63032af320c1f8
-
Size
813KB
-
MD5
29c1869bf0f68b3478a8405743523100
-
SHA1
4e77b031c7a427bb52b4400a514c5b3844e61e87
-
SHA256
351bb8ef093fa2cc551957bc1b2c7f6633d1f0dad4b682b45f63032af320c1f8
-
SHA512
6738df906d3f843cf9e4db45b921668aa160290f3def77947c4f9ea74ede363e009410852571cbad63f642ab71bdbf25964be2e6ecf901ba9a57aaf0786341e3
-
SSDEEP
12288:aPSyIPPtbk+K0sSY5JhYQgeCeNnKv4GZ1zY675Lo+L1UkEIs7edR9gAPhMAp/kc:a6yIXQ3S6QQiB7VLLCFIHdR9gVApMc
Malware Config
Signatures
Files
-
351bb8ef093fa2cc551957bc1b2c7f6633d1f0dad4b682b45f63032af320c1f8.exe windows x86
890de37a4ee2f02d25d21dd8557d2505
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GetTempPathA
GetModuleFileNameA
FindClose
FindNextFileA
FindFirstFileA
CreateFileA
CloseHandle
WaitForSingleObject
SetThreadContext
WriteProcessMemory
VirtualProtectEx
GetThreadContext
SuspendThread
Sleep
UnmapViewOfFile
GetEnvironmentVariableA
FreeLibrary
MapViewOfFile
CreateFileMappingA
SetFilePointer
GetCurrentProcessId
SleepEx
CreateThread
WriteFile
GetTempFileNameA
CreateMailslotA
SetEnvironmentVariableA
CreateProcessA
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
GetFileSize
DeleteFileA
GetVersionExA
GetExitCodeProcess
TerminateProcess
WaitForDebugEvent
DebugActiveProcess
GetLastError
ResumeThread
ReadFile
LoadLibraryA
GetStringTypeW
ContinueDebugEvent
FlushFileBuffers
HeapFree
ExitProcess
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
RtlUnwind
GetVersion
FreeEnvironmentStringsA
FreeEnvironmentStringsW
HeapAlloc
GetCurrentProcess
UnhandledExceptionFilter
user32
MessageBoxA
EnumWindows
SendMessageTimeoutA
GetWindowThreadProcessId
DestroyWindow
SystemParametersInfoA
CreateDialogParamA
UpdateWindow
SetTimer
GetDlgItem
TranslateMessage
BeginPaint
EndPaint
LoadCursorA
GetSystemMetrics
ShowWindow
KillTimer
PostQuitMessage
DefWindowProcA
RegisterClassA
CreateWindowExA
GetMessageA
SetWindowTextA
DispatchMessageA
gdi32
CreateDIBitmap
RealizePalette
DeleteDC
CreateDCA
CreatePalette
SelectPalette
SelectObject
CreateCompatibleDC
BitBlt
DeleteObject
Sections
.text Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE