Static task
static1
Behavioral task
behavioral1
Sample
334a7409bb9d21b40912159079679b5860e73942935239cebf443d8e9ba6544e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
334a7409bb9d21b40912159079679b5860e73942935239cebf443d8e9ba6544e.exe
Resource
win10v2004-20220812-en
General
-
Target
334a7409bb9d21b40912159079679b5860e73942935239cebf443d8e9ba6544e
-
Size
138KB
-
MD5
6237d88e0a72c1031a8218a0c545764c
-
SHA1
8a96c16ce6ee0b9692ad48629ec9720e6caf33df
-
SHA256
334a7409bb9d21b40912159079679b5860e73942935239cebf443d8e9ba6544e
-
SHA512
8c41da3252242df12130fbafcfa6fbd0ef521c85079731978ba5246ee40d4f6f136aeab78909084fb49d67716a8e60baed97c412e075aa8c90860024d6d841a6
-
SSDEEP
3072:JbYw/yr+ncW1Hje8mqXUYlgQW+iHVs4+y:JbYw6CncW1NEQ76C
Malware Config
Signatures
Files
-
334a7409bb9d21b40912159079679b5860e73942935239cebf443d8e9ba6544e.exe windows x86
7d9cdfbf3a1252dd65168971a76e27c5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
urlmon
URLDownloadToCacheFileW
psapi
EnumProcesses
EnumProcessModules
GetModuleBaseNameW
GetDeviceDriverBaseNameW
EnumDeviceDrivers
kernel32
WriteFile
lstrcatW
MoveFileW
DeleteFileW
GetTempFileNameW
CreateFileW
lstrcpyW
GetSystemDirectoryW
GetCurrentThreadId
GetLocalTime
Module32FirstW
CreateToolhelp32Snapshot
Process32NextW
Process32FirstW
GetVersionExW
FindClose
FindNextFileW
FindFirstFileW
GetSystemTimeAsFileTime
GetVolumeInformationA
GetDriveTypeA
HeapAlloc
GetProcessHeap
HeapFree
GetLongPathNameW
GetTempPathW
CopyFileW
Thread32Next
SuspendThread
ResumeThread
OpenThread
Thread32First
GetModuleFileNameW
GetModuleHandleW
WaitForSingleObject
CreateMutexW
ReadFile
SetFilePointer
GetFileSize
GetLastError
WideCharToMultiByte
Sleep
TerminateProcess
GetFullPathNameW
CreateProcessW
OpenMutexW
IsDebuggerPresent
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetCPInfo
GetOEMCP
GetACP
IsBadCodePtr
IsBadReadPtr
HeapSize
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetFileType
GetStdHandle
SetHandleCount
GetTickCount
OpenProcess
CloseHandle
lstrlenW
LoadLibraryA
GetProcAddress
FreeLibrary
InitializeCriticalSection
SetStdHandle
FlushFileBuffers
QueryPerformanceCounter
GetCurrentProcessId
lstrcmpiA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
UnhandledExceptionFilter
GetCurrentProcess
ExitProcess
LCMapStringW
MultiByteToWideChar
LCMapStringA
VirtualQuery
InterlockedExchange
SetUnhandledExceptionFilter
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
GetVersionExA
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
GetModuleHandleA
user32
CharLowerBuffW
GetKeyboardLayoutList
wvsprintfW
wsprintfW
advapi32
RegDeleteValueW
RegCreateKeyW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryValueExW
RegCloseKey
shell32
SHGetSpecialFolderPathW
ShellExecuteW
ole32
CoCreateInstance
CoInitialize
CLSIDFromString
rpcrt4
UuidCreate
UuidToStringW
RpcStringFreeW
wininet
InternetReadFile
HttpQueryInfoA
HttpQueryInfoW
InternetCloseHandle
InternetOpenUrlW
InternetOpenW
InternetQueryOptionW
Sections
.text Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ