Static task
static1
Behavioral task
behavioral1
Sample
c34a8339fb0217f7e02b9f0258bbbdf51b73b21148a6ab29a8adedf4c00c134a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c34a8339fb0217f7e02b9f0258bbbdf51b73b21148a6ab29a8adedf4c00c134a.exe
Resource
win10v2004-20220901-en
General
-
Target
c34a8339fb0217f7e02b9f0258bbbdf51b73b21148a6ab29a8adedf4c00c134a
-
Size
799KB
-
MD5
6a9b76cbdeeb62ab3a62cb6d8d7bab42
-
SHA1
afc0215c0d17f990b75a0590b7edb30d505d4178
-
SHA256
c34a8339fb0217f7e02b9f0258bbbdf51b73b21148a6ab29a8adedf4c00c134a
-
SHA512
65493d40a3285feda0d2bd06dd46d3a09fac693465be9edfc3ccd9f35cf22ece1a9c7ba1a7f887d09cdff0822f7621b1fea2523ebbb532bb2004096ea9589b6b
-
SSDEEP
24576:Nraj0vWJ/R2JI0Vf7S7uHGG7S5FgTFAXfep+i61Xx:NrJA/O7VQuHH7/AXGpU1B
Malware Config
Signatures
Files
-
c34a8339fb0217f7e02b9f0258bbbdf51b73b21148a6ab29a8adedf4c00c134a.exe windows x86
f4e93bc3ea6e23e6c2dab5644a449583
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersion
GetCurrentThread
ExitProcess
HeapAlloc
GetProcessHeap
VirtualAlloc
FindResourceA
Sleep
VirtualFree
WriteFile
HeapCreate
IsValidCodePage
lstrcmpiW
CreateProcessA
GetEnvironmentStrings
GetACP
lstrcpynA
CloseHandle
ReadFile
TlsFree
CompareStringA
InterlockedCompareExchange
HeapSize
WideCharToMultiByte
SizeofResource
FileTimeToLocalFileTime
lstrlenW
VirtualQuery
GlobalUnlock
GetEnvironmentStringsW
GetThreadLocale
FindNextFileW
LCMapStringA
FindResourceW
GetConsoleCP
GlobalFree
lstrlenA
LCMapStringW
InterlockedIncrement
CreateFileA
TlsSetValue
GetFileType
CreateEventA
CreateFileW
GetTimeZoneInformation
GlobalLock
WaitForMultipleObjects
FindNextFileA
CreateFileMappingA
ResetEvent
FindFirstFileA
GetSystemInfo
GetProcAddress
DeleteFileW
DeleteFileA
GetFileSize
GetStartupInfoA
FreeLibrary
LoadLibraryA
GetModuleHandleA
TlsAlloc
QueryPerformanceCounter
GetOEMCP
lstrcmpiA
SetHandleCount
EnterCriticalSection
HeapFree
WriteConsoleW
LeaveCriticalSection
SetEndOfFile
GetConsoleMode
GlobalAlloc
TerminateProcess
SetUnhandledExceptionFilter
SetFileAttributesA
CreateThread
SetFilePointer
CreateMutexA
MultiByteToWideChar
InterlockedDecrement
UnhandledExceptionFilter
GetModuleFileNameA
GetVersionExA
IsDebuggerPresent
GetModuleFileNameW
InitializeCriticalSection
SetLastError
FormatMessageA
TlsGetValue
FindClose
LoadResource
GetEnvironmentVariableA
LocalFree
SetEvent
GetFullPathNameA
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
InterlockedExchange
GetStringTypeA
LoadLibraryW
GetCPInfo
SetStdHandle
FreeEnvironmentStringsW
LoadLibraryExW
LocalAlloc
GetLocaleInfoA
GetCurrentProcess
DeleteCriticalSection
FreeEnvironmentStringsA
GetFileAttributesW
HeapDestroy
FindFirstFileW
WaitForSingleObject
GetFileAttributesA
ReleaseMutex
GetConsoleOutputCP
GetStdHandle
GetCurrentThreadId
GetLastError
GetCurrentProcessId
GetCommandLineA
FlushFileBuffers
GetTickCount
user32
GetSysColor
MessageBoxA
EndDialog
TrackPopupMenu
LoadIconA
LoadCursorA
ScreenToClient
GetDlgItem
SetTimer
CheckMenuItem
SetWindowTextA
SetWindowLongA
SetCapture
GetWindowRect
GetSystemMetrics
DefWindowProcA
KillTimer
BeginPaint
PeekMessageA
SetFocus
EndPaint
FillRect
CreateWindowExA
GetSubMenu
EnableMenuItem
IsWindowEnabled
TranslateMessage
EnableWindow
ShowWindow
GetParent
GetMessageA
DestroyWindow
GetClientRect
GetCursorPos
GetDC
DispatchMessageA
IsWindow
SetWindowPos
LoadBitmapA
PostQuitMessage
SetForegroundWindow
InvalidateRect
SendMessageA
CallWindowProcA
ReleaseDC
SetCursor
IsWindowVisible
advapi32
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
RegSetValueExW
Sections
.text Size: 768KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ