Static task
static1
Behavioral task
behavioral1
Sample
34485b218ee047d83a2e19741ae9e44d235e2928c2fdd6bf204d0a6869a825bd.exe
Resource
win7-20220812-en
General
-
Target
34485b218ee047d83a2e19741ae9e44d235e2928c2fdd6bf204d0a6869a825bd
-
Size
1008KB
-
MD5
2070b69a9cda563b21f779f6a0fa1330
-
SHA1
0a6efa5cc99b5b9b8cd4d623e43671d035e910f4
-
SHA256
34485b218ee047d83a2e19741ae9e44d235e2928c2fdd6bf204d0a6869a825bd
-
SHA512
c73a118eb3d332aac480e8bb13538a24251adedac664c248b540c1ba26cce0420a122440fc5fbbe2ad04a523bba1565c4caef6a9bc9be9312d5276531fa10846
-
SSDEEP
24576:aM5ZXrFPTjft7CNJ8xmvQ9811eHu8vJSx38VtS:3BK8Io97y3itS
Malware Config
Signatures
Files
-
34485b218ee047d83a2e19741ae9e44d235e2928c2fdd6bf204d0a6869a825bd.exe windows x86
bb710784fa75d3928a47941d5a58cb09
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
OleInitialize
OleUninitialize
CoInitialize
CoCreateInstance
CoUninitialize
CoCreateGuid
shlwapi
SHDeleteKeyA
PathFileExistsA
wininet
InternetCanonicalizeUrlA
InternetReadFile
InternetGetLastResponseInfoA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetTimeToSystemTime
InternetSetOptionA
InternetCrackUrlA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetGetConnectedState
user32
SendDlgItemMessageA
FillRect
GetDlgItemTextA
GetClassInfoExA
LoadCursorA
RegisterClassExA
GetSystemMetrics
CreateWindowExA
CharUpperA
CharLowerA
CharNextA
GetClassNameA
SetWindowLongA
UpdateWindow
SetTimer
RedrawWindow
GetMessageA
TranslateMessage
DispatchMessageA
DialogBoxParamA
CharPrevA
GetWindowTextA
GetClientRect
SetWindowRgn
DestroyWindow
GetWindowLongA
ClientToScreen
GetFocus
DefWindowProcA
GetForegroundWindow
GetCursorPos
PtInRect
InvalidateRect
BeginPaint
EndPaint
SetWindowTextA
LoadIconA
SendMessageA
GetSystemMenu
EnableMenuItem
SetDlgItemTextA
GetDlgItem
SetForegroundWindow
SetActiveWindow
SetFocus
ShowWindow
GetWindowRect
ScreenToClient
SetWindowPos
EndDialog
LoadStringA
GetDC
ReleaseDC
DrawTextW
MessageBoxA
EnumWindows
oleaut32
SysAllocString
SysFreeString
VariantInit
VariantClear
SysAllocStringLen
gdi32
CreatePatternBrush
GetDeviceCaps
CreateBitmap
GetObjectA
BitBlt
StretchBlt
CombineRgn
SetTextColor
CreateCompatibleDC
SelectObject
GetTextExtentPointW
CreateFontW
DeleteObject
GetPixel
CreateRectRgn
TextOutW
GetTextExtentPoint32A
SetPixel
GetStockObject
SetBkMode
DeleteDC
advapi32
ConvertSidToStringSidA
IsValidSid
GetLengthSid
InitializeAcl
AddAccessDeniedAce
AddAccessAllowedAce
RegOpenKeyA
InitializeSecurityDescriptor
RegSetValueA
RegQueryValueExA
OpenProcessToken
GetTokenInformation
EqualSid
RegQueryValueA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegDeleteValueA
FreeSid
GetUserNameA
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
LookupAccountNameA
AllocateAndInitializeSid
shell32
SHGetFolderPathW
SHGetSpecialFolderPathA
ShellExecuteExA
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
msimg32
TransparentBlt
kernel32
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
SetUnhandledExceptionFilter
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GetCurrentDirectoryA
IsDebuggerPresent
GetConsoleCP
GetConsoleMode
HeapCreate
FileTimeToLocalFileTime
GetModuleHandleW
ExitProcess
GetCommandLineA
GetStartupInfoA
GetFileType
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetEnvironmentVariableA
GetFullPathNameA
SetEndOfFile
GetTimeZoneInformation
VirtualFree
VirtualAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetHandleCount
GetStdHandle
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableW
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
GetStringTypeW
FlushFileBuffers
LCMapStringA
LCMapStringW
CompareStringA
EnterCriticalSection
CreateNamedPipeA
GetSystemInfo
GetFileAttributesA
GetDriveTypeA
GetTempPathA
GetTempFileNameA
InterlockedDecrement
InterlockedIncrement
RaiseException
GetLastError
lstrcpyA
lstrlenA
CloseHandle
CreateMutexA
OpenMutexA
ReadFile
PeekNamedPipe
WriteFile
ConnectNamedPipe
CompareStringW
Process32Next
OpenProcess
Process32First
CreateToolhelp32Snapshot
GetVersionExA
FreeLibrary
GetProcAddress
LoadLibraryA
WideCharToMultiByte
RemoveDirectoryA
FindClose
DeleteFileA
FindNextFileA
FindFirstFileA
GetModuleFileNameA
GetDiskFreeSpaceA
GetDiskFreeSpaceExA
GetCurrentProcess
GetModuleHandleA
ExpandEnvironmentStringsA
MultiByteToWideChar
GetFileSize
CreateFileA
Sleep
CreateDirectoryA
GetPrivateProfileStringA
WritePrivateProfileStringA
LocalFree
CompareFileTime
SystemTimeToFileTime
GetFileTime
GetTickCount
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
SetFileAttributesA
SetFilePointer
FileTimeToSystemTime
GetFileInformationByHandle
GetFileSizeEx
GetSystemTimeAsFileTime
GetSystemTime
GetLocaleInfoA
CopyFileA
FreeResource
rpcrt4
UuidToStringA
RpcStringFreeA
crypt32
CertGetNameStringW
CryptMsgGetParam
CryptQueryObject
CertFreeCertificateContext
CryptMsgClose
CertCloseStore
CertFindCertificateInStore
Sections
.text Size: 337KB - Virtual size: 337KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 612KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE