Static task
static1
Behavioral task
behavioral1
Sample
35395f577937d35d72b2e41918cbfb12645b4620f333a7cb7eb4fba4d8bb24a8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
35395f577937d35d72b2e41918cbfb12645b4620f333a7cb7eb4fba4d8bb24a8.exe
Resource
win10v2004-20221111-en
General
-
Target
35395f577937d35d72b2e41918cbfb12645b4620f333a7cb7eb4fba4d8bb24a8
-
Size
6.4MB
-
MD5
8fc67e2c0a34d487ca0d4c87034989c1
-
SHA1
c249e1f9fd7b6913bbe68372d3752e7286f1b576
-
SHA256
35395f577937d35d72b2e41918cbfb12645b4620f333a7cb7eb4fba4d8bb24a8
-
SHA512
d4ea896c45c9711a175ef00eb578ed11be65d6ac5eeec76325fbc575a3a3123b796b654b999f5db0e0655a3e83b119dc5c9dad58f1d3cbf264a6d4dd7b0ef293
-
SSDEEP
98304:6xXG500ygeEEtEE8EEUv9pR9aG2lZqriZVB1z14u/ZVB1z14uM:6xXC0hEEtEE8EEQRr+HiuLHiuM
Malware Config
Signatures
Files
-
35395f577937d35d72b2e41918cbfb12645b4620f333a7cb7eb4fba4d8bb24a8.exe windows x86
778f432fd0e7032e1d1248175355fbb7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetModuleFileNameExA
EnumProcessModules
iphlpapi
GetAdaptersInfo
kernel32
GetFileTime
SetErrorMode
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
GetSystemTimeAsFileTime
GetCommandLineA
RtlUnwind
HeapSize
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
GetTimeZoneInformation
GetACP
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
SetHandleCount
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetDriveTypeA
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GetCurrentDirectoryA
GetShortPathNameA
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
GetOEMCP
GetCPInfo
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GetThreadLocale
GlobalFlags
WritePrivateProfileStringA
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
GetModuleFileNameW
InterlockedDecrement
InterlockedIncrement
lstrcmpA
GlobalReAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
GetProfileIntA
GetTickCount
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GlobalSize
FreeResource
ReleaseMutex
LocalFree
LocalAlloc
FormatMessageA
GetProcessHeap
HeapFree
HeapAlloc
GetStartupInfoA
CreateProcessA
GetModuleHandleA
SetLastError
CreateMutexA
MulDiv
DeleteFileA
DeleteCriticalSection
FindNextFileA
FindClose
FindFirstFileA
CreateDirectoryA
DeviceIoControl
TerminateThread
CreateThread
GetTempPathA
GetCurrentProcessId
CloseHandle
GetVersionExA
GetModuleFileNameA
LoadLibraryA
GetLocalTime
CopyFileA
GetProcAddress
GetSystemDirectoryA
ReadFile
TerminateProcess
GetFileAttributesA
Sleep
OpenProcess
WriteFile
WaitForSingleObject
GetCurrentProcess
FreeLibrary
SetLocalTime
GetFileSize
CreateFileA
GetComputerNameA
GlobalHandle
GlobalFree
GlobalUnlock
GlobalAlloc
GlobalLock
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetVersion
CompareStringA
LockResource
GetLastError
InterlockedExchange
lstrlenW
MultiByteToWideChar
CompareStringW
SizeofResource
WideCharToMultiByte
LoadResource
lstrlenA
FindResourceA
RaiseException
user32
UnregisterClassA
GetSysColorBrush
DestroyMenu
RegisterClipboardFormatA
GetMessageA
TranslateMessage
ValidateRect
SetWindowContextHelpId
MapDialogRect
PostQuitMessage
InflateRect
IsClipboardFormatAvailable
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SendDlgItemMessageA
WinHelpA
IsChild
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
TrackPopupMenu
EnableWindow
CharUpperA
SendMessageA
GetClientRect
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
ScreenToClient
EqualRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowTextLengthA
SetFocus
GetMenuItemID
GetMenuItemCount
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
CharNextA
CopyAcceleratorTableA
IsRectEmpty
SetRect
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
PostThreadMessageA
GetNextDlgTabItem
GetLastActivePopup
DispatchMessageA
GetSystemMetrics
GetCursorPos
ReleaseDC
MessageBoxA
GetDC
ExitWindowsEx
GetDesktopWindow
InvalidateRect
GetWindowRect
DestroyIcon
LoadCursorA
AppendMenuA
BringWindowToTop
RegisterWindowMessageA
LoadIconA
LoadMenuA
LoadBitmapA
GetSubMenu
GetSystemMenu
SetCursor
PostMessageA
EndDialog
GetScrollPos
SetScrollPos
SetScrollRange
PtInRect
SetTimer
GetWindowThreadProcessId
GetWindowTextA
IsWindowEnabled
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
GetMenuState
CheckMenuItem
GetActiveWindow
GetWindow
SetCapture
GetFocus
GetCapture
GetWindowLongA
GetSysColor
ReleaseCapture
CopyRect
GetParent
EnableMenuItem
gdi32
GetRgnBox
GetTextColor
GetBkColor
GetMapMode
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
DeleteDC
BitBlt
CreateFontIndirectA
GetDeviceCaps
StretchBlt
CreateBitmap
SetBitmapBits
GetBitmapBits
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
MoveToEx
LineTo
SetMapMode
SetBkMode
RestoreDC
SaveDC
CreateRectRgnIndirect
SetBkColor
SetTextColor
GetClipBox
CopyMetaFileA
GetTextExtentPoint32A
RoundRect
SetDIBits
CreateSolidBrush
CreatePen
Rectangle
DeleteObject
GetStockObject
GetObjectA
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegSetValueExA
RegQueryValueExA
RegQueryValueA
RegOpenKeyA
RegSetValueA
RegEnumKeyA
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegCloseKey
AdjustTokenPrivileges
RegOpenKeyExA
LookupPrivilegeValueA
OpenProcessToken
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
DragQueryFileA
Shell_NotifyIconA
ExtractIconA
ShellExecuteA
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CoFreeUnusedLibraries
OleInitialize
CoDisconnectObject
OleIsCurrentClipboard
OleFlushClipboard
StringFromCLSID
CoTaskMemFree
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoCreateInstance
OleUninitialize
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
CoRegisterMessageFilter
CLSIDFromProgID
StringFromGUID2
CoRevokeClassObject
CoRegisterClassObject
RevokeDragDrop
CoLockObjectExternal
RegisterDragDrop
OleGetClipboard
OleDuplicateData
CoTaskMemAlloc
ReleaseStgMedium
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
OleCreateFontIndirect
SafeArrayDestroy
LoadTypeLi
RegisterTypeLi
LoadRegTypeLi
SysAllocString
VariantCopy
SysAllocStringLen
VariantInit
VariantChangeType
VariantClear
SysStringByteLen
SysAllocStringByteLen
SysFreeString
SysStringLen
ws2_32
WSAStartup
send
listen
accept
inet_addr
closesocket
recv
gethostbyname
socket
bind
WSACleanup
htons
inet_ntoa
connect
odbc32
ord16
ord17
ord41
ord10
ord2
ord1
ord15
ord9
ord14
ord3
ord61
ord20
ord8
ord48
ord49
ord11
ord19
ord12
ord46
ord18
ord13
ord59
ord43
ord68
ord44
ord45
ord50
ord51
ord5
Sections
.text Size: 736KB - Virtual size: 734KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 148KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5.5MB - Virtual size: 5.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ