Static task
static1
Behavioral task
behavioral1
Sample
34779c0a8ffff34274c9682d82d99d427932b7ef414bec11f6f21cc0a68fb62a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
34779c0a8ffff34274c9682d82d99d427932b7ef414bec11f6f21cc0a68fb62a.exe
Resource
win10v2004-20220812-en
General
-
Target
34779c0a8ffff34274c9682d82d99d427932b7ef414bec11f6f21cc0a68fb62a
-
Size
1.1MB
-
MD5
43243d217e9867508d5782779cf145e5
-
SHA1
ebcf008e10f48205144a500189f3c44548db1cae
-
SHA256
34779c0a8ffff34274c9682d82d99d427932b7ef414bec11f6f21cc0a68fb62a
-
SHA512
355766838870a538a8481766df64e5b9c0c022b9d39ab277f4dedbe8bfe3c98fcd6477f53838a0a1dfdfa8cb8d03f9f9319a7c6cb7b1ed1b40bac3e5934ddf08
-
SSDEEP
24576:hNziEuw5SDKZHqTQy4KSPxk/zFmW+hDp2:Dz/uw55HqTQy4l6l+hM
Malware Config
Signatures
Files
-
34779c0a8ffff34274c9682d82d99d427932b7ef414bec11f6f21cc0a68fb62a.exe windows x86
8424a352743cd152af179d49c107bf1b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetProcessAffinityMask
SetStdHandle
FlushViewOfFile
ExpandEnvironmentStringsA
GetPrivateProfileStructA
CreateDirectoryA
GetConsoleAliasExesLengthW
GetPrivateProfileIntA
ChangeTimerQueueTimer
GetDiskFreeSpaceExW
SetEnvironmentVariableA
GetHandleInformation
FoldStringW
GetFileSizeEx
GetProfileSectionA
CreateDirectoryExA
SetUnhandledExceptionFilter
GetOEMCP
OpenThread
SetEvent
GetOverlappedResult
SetProcessPriorityBoost
GetLocalTime
GetProcessVersion
RemoveDirectoryA
SetComputerNameExA
FindFirstFileA
GetUserDefaultLangID
SetSystemPowerState
ExitThread
GetCPInfo
GetCalendarInfoW
GetStartupInfoA
GetVolumeInformationW
ReplaceFileW
GetEnvironmentVariableA
lstrcpynA
FormatMessageW
HeapValidate
GetProfileIntW
PeekNamedPipe
GetQueuedCompletionStatus
FlushFileBuffers
SetConsoleDisplayMode
GetConsoleAliasExesLengthA
CreateIoCompletionPort
GetCurrencyFormatW
FileTimeToDosDateTime
GetTempPathA
GetThreadTimes
FindFirstVolumeW
GetLogicalDrives
FindAtomW
SetThreadContext
GetExitCodeThread
FreeLibraryAndExitThread
GetFileTime
LoadResource
GetSystemDefaultLCID
CreateWaitableTimerW
GetConsoleAliasesA
GetDevicePowerState
OpenWaitableTimerA
GetEnvironmentVariableW
IsSystemResumeAutomatic
GetLongPathNameW
GetStringTypeA
IsValidCodePage
SetConsoleTextAttribute
GetCurrentProcess
ReadFile
GetFileAttributesExW
OpenFileMappingA
SetFileAttributesW
CreateDirectoryW
CreateFileMappingW
WriteConsoleW
GetFullPathNameA
AddAtomA
SetPriorityClass
VerifyVersionInfoW
GetCurrentDirectoryW
GetConsoleCursorInfo
GetCompressedFileSizeW
GetNumberFormatA
GetEnvironmentStringsW
DefineDosDeviceW
GetConsoleOutputCP
MapUserPhysicalPages
FlushConsoleInputBuffer
CreateEventW
EraseTape
CreateMutexW
GetUserDefaultUILanguage
FindNextChangeNotification
SetEndOfFile
GetEnvironmentStrings
SetConsoleCP
GetConsoleAliasExesW
GetLocaleInfoW
GetThreadPriority
GetSystemDefaultLangID
SetInformationJobObject
SetCalendarInfoA
ResetEvent
EnumCalendarInfoW
GetDiskFreeSpaceExA
lstrcatW
FindResourceW
GetPrivateProfileStringW
LocalFileTimeToFileTime
OpenFileMappingW
GetConsoleAliasA
GetNumberOfConsoleInputEvents
GetDateFormatW
SetSystemTimeAdjustment
GetProcessWorkingSetSize
GetPrivateProfileSectionNamesW
GetPrivateProfileIntW
HeapSetInformation
GetWindowsDirectoryW
MapUserPhysicalPagesScatter
GetACP
ReadDirectoryChangesW
CopyFileW
GlobalReAlloc
GlobalHandle
GetNamedPipeInfo
SetThreadIdealProcessor
DuplicateHandle
CreateTimerQueueTimer
SetCurrentDirectoryW
PostQueuedCompletionStatus
GetNamedPipeHandleStateW
FindResourceExW
GlobalUnlock
CreateSemaphoreA
DeleteFileA
GetCurrentThread
GetStringTypeW
CreateSemaphoreW
SetWaitableTimer
GetLongPathNameA
GetFileAttributesExA
CreateHardLinkW
GetTimeFormatA
GetFullPathNameW
AddAtomW
CreateJobObjectW
IsBadReadPtr
GetConsoleAliasW
GetTimeFormatW
SetThreadLocale
GetTempFileNameW
GetModuleHandleA
GetSystemWindowsDirectoryW
FormatMessageA
GetFileInformationByHandle
SetCurrentDirectoryA
OpenWaitableTimerW
DebugBreak
ExpandEnvironmentStringsW
GetPrivateProfileStructW
GetShortPathNameW
CreateFileMappingA
SetFileTime
ReleaseMutex
GetVersion
GetPrivateProfileSectionNamesA
OpenProcess
GetCommandLineA
OpenJobObjectA
GetDriveTypeA
SetLocaleInfoA
GetCurrencyFormatA
CreateMutexA
GetBinaryTypeA
GetProcessTimes
FindFirstVolumeA
CreateHardLinkA
MoveFileWithProgressA
Module32Next
MapViewOfFileEx
SetCalendarInfoW
MulDiv
GetNumberFormatW
GetDateFormatA
GetNamedPipeHandleStateA
VirtualAlloc
AreFileApisANSI
IsDBCSLeadByteEx
LCMapStringW
HeapReAlloc
GetCurrentConsoleFont
GetFileSize
ConvertDefaultLocale
GetProcessIoCounters
MultiByteToWideChar
GetSystemDefaultUILanguage
OpenJobObjectW
GetThreadContext
ReplaceFileA
CompareStringA
GetStringTypeExA
SetThreadAffinityMask
EnumCalendarInfoA
GetProfileStringW
GetProcAddress
DeleteTimerQueue
SetProcessWorkingSetSize
GetVolumePathNameW
GetPriorityClass
SetFileAttributesA
GetSystemDirectoryW
GetWindowsDirectoryA
FoldStringA
SetThreadPriorityBoost
GetFileAttributesW
ContinueDebugEvent
CreateTapePartition
GetDiskFreeSpaceA
FindFirstFileExA
GetTapeStatus
CreateJobObjectA
FlushInstructionCache
GetConsoleWindow
GetShortPathNameA
GetModuleHandleW
SetErrorMode
GetTempPathW
CreateToolhelp32Snapshot
OpenMutexW
AssignProcessToJobObject
DefineDosDeviceA
HeapAlloc
HeapSize
RtlUnwind
Sleep
HeapFree
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
LoadLibraryW
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapCreate
InterlockedDecrement
GetLastError
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
EncodePointer
DeleteCriticalSection
ExitProcess
DecodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
IsProcessorFeaturePresent
user32
RedrawWindow
advapi32
AllocateAndInitializeSid
RegConnectRegistryW
EqualSid
RegEnumKeyA
GetSecurityDescriptorGroup
RegOpenKeyA
RegSetKeySecurity
RegisterEventSourceW
GetSecurityDescriptorLength
OpenSCManagerW
AddAccessAllowedAce
RegCloseKey
CryptAcquireContextA
AdjustTokenPrivileges
IsValidSecurityDescriptor
SetFileSecurityW
ImpersonateLoggedOnUser
OpenProcessToken
StartServiceW
SetSecurityDescriptorOwner
CryptDestroyKey
LsaClose
GetSecurityDescriptorOwner
SetSecurityDescriptorDacl
OpenThreadToken
GetLengthSid
CryptGenRandom
LsaQueryInformationPolicy
RegEnumKeyExA
CreateProcessAsUserW
InitializeAcl
GetSecurityDescriptorControl
SetThreadToken
CryptHashData
RegCreateKeyExA
RegOpenKeyExW
DuplicateTokenEx
GetTokenInformation
RegOpenKeyW
CloseServiceHandle
shell32
SHBindToParent
SHGetFolderPathW
SHGetSpecialFolderPathW
SHGetMalloc
SHFileOperationW
ShellExecuteExW
SHGetSpecialFolderLocation
SHBrowseForFolderW
ShellExecuteW
SHChangeNotify
CommandLineToArgvW
SHGetDesktopFolder
SHGetFileInfoW
oleaut32
SafeArrayPtrOfIndex
SysStringLen
GetErrorInfo
VariantInit
VariantChangeTypeEx
VariantCopyInd
SysFreeString
VariantCopy
SysReAllocStringLen
VariantChangeType
SafeArrayGetUBound
SysAllocStringByteLen
SafeArrayCreate
SafeArrayGetLBound
GetActiveObject
VariantClear
SysAllocStringLen
Sections
.text Size: 674KB - Virtual size: 673KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 374KB - Virtual size: 719KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ