Static task
static1
Behavioral task
behavioral1
Sample
34f4dc6918848c9c93834b533eb378e1b3457ad971ffcfcb810ecc3dad478343.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
34f4dc6918848c9c93834b533eb378e1b3457ad971ffcfcb810ecc3dad478343.exe
Resource
win10v2004-20220901-en
General
-
Target
34f4dc6918848c9c93834b533eb378e1b3457ad971ffcfcb810ecc3dad478343
-
Size
176KB
-
MD5
b7a846ad4f4c5ec499cd129834df12d1
-
SHA1
f2732abb4c084c948ddcfd59a8f133af55bab718
-
SHA256
34f4dc6918848c9c93834b533eb378e1b3457ad971ffcfcb810ecc3dad478343
-
SHA512
7f570991cd00a02fe8f04f902b56ecdab90fc9b0e1152843794a8d9209212e722e6efcee959b30650f57a0cb5643da507286da1db981d8e5cdb8a2bb31f23d52
-
SSDEEP
3072:S8R6tz0vJWTTEzQ1eRjreUyHh/QCgussyXxA+xs/sL8ehnCmC8mYjIQzk3Qvd0:SV4JElgRja/QCgussyXdG/sLT9CmWA
Malware Config
Signatures
Files
-
34f4dc6918848c9c93834b533eb378e1b3457ad971ffcfcb810ecc3dad478343.exe windows x86
915f10402bcca7004dfc2261fef1b5d9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyExW
RegCloseKey
RegSetValueExW
shlwapi
SHDeleteKeyW
shell32
SHCreateDirectoryExW
SHFileOperationW
SHGetFolderPathW
user32
GetClassLongA
MessageBoxW
rpcrt4
UuidCreate
ole32
CoUninitialize
CoCreateInstance
StringFromGUID2
CoCreateGuid
CoInitialize
CoSetProxyBlanket
kernel32
GetStringTypeA
SetEndOfFile
TlsFree
GetThreadPriority
GetCurrentProcess
TerminateProcess
GetProcAddress
GetLocaleInfoA
InterlockedDecrement
TlsGetValue
TlsAlloc
GetConsoleOutputCP
GetLocaleInfoW
LCMapStringW
RaiseException
CreateFileA
ReadFile
GetModuleFileNameA
GetCurrentThreadId
GetVersionExA
UnhandledExceptionFilter
DeleteCriticalSection
RtlUnwind
GetStringTypeW
GetUserDefaultLCID
MultiByteToWideChar
SetFilePointer
GetSystemTimeAsFileTime
TlsSetValue
WriteConsoleW
SetCommTimeouts
GetStartupInfoA
GetLastError
GetModuleFileNameW
FreeEnvironmentStringsW
WriteConsoleA
InitializeCriticalSection
LoadLibraryA
EnterCriticalSection
SetLastError
GetConsoleMode
GlobalAlloc
GetACP
GetFileType
IsValidLocale
VirtualFree
EnumResourceNamesA
ExitProcess
EnumSystemLocalesA
LCMapStringA
GetConsoleCP
WideCharToMultiByte
GetTickCount
GetFullPathNameW
ExitProcess
GetCurrentDirectoryW
InterlockedIncrement
LeaveCriticalSection
SetUnhandledExceptionFilter
VirtualAlloc
GetOEMCP
CloseHandle
IsValidCodePage
HeapDestroy
IsDebuggerPresent
Sleep
GetModuleHandleA
GetEnvironmentStringsW
HeapAlloc
GetCommandLineA
GetStdHandle
SetStdHandle
HeapCreate
WriteFile
GetProcessHeap
FreeEnvironmentStringsA
GetCPInfo
QueryPerformanceCounter
SetHandleCount
GetEnvironmentStrings
FlushFileBuffers
HeapSize
HeapFree
GetCurrentProcessId
HeapReAlloc
GetFullPathNameA
Sections
.text Size: 147KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.crt Size: 512B - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ