Static task
static1
Behavioral task
behavioral1
Sample
c35bde5b381bcb235ef7fb6bd4349d671b864075762f8106400a27285cfe573b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c35bde5b381bcb235ef7fb6bd4349d671b864075762f8106400a27285cfe573b.exe
Resource
win10v2004-20220901-en
General
-
Target
c35bde5b381bcb235ef7fb6bd4349d671b864075762f8106400a27285cfe573b
-
Size
196KB
-
MD5
9b64c4757a633b48249e56bcebeaf7ed
-
SHA1
bc6d3e87b73c0b221e9f4e27a25e238fd0eadee5
-
SHA256
c35bde5b381bcb235ef7fb6bd4349d671b864075762f8106400a27285cfe573b
-
SHA512
4da2d0e8743c08feaaf2397cd9cfa1edb9c44d9a80b25574901b92d4a4e9d8f4888191b65442f4ba9c93abd6d230f8b839cc457bcff487b5f37c25e6265ff9bf
-
SSDEEP
3072:gwXfRT/U4ut20zdsBcw8W+qQEVXEBidxBx1WL1WgNJzyYzJ/NlvDzn:ggrUcxIEVXtxBH2WAbnDzn
Malware Config
Signatures
Files
-
c35bde5b381bcb235ef7fb6bd4349d671b864075762f8106400a27285cfe573b.exe windows x86
ab8dcdd0ce0fa6db4ae2b4925562c5b6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
userenv
GetUserProfileDirectoryA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
kernel32
GetLocaleInfoW
SetEndOfFile
GetLastError
CloseHandle
ReadFile
CreateFileA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
SizeofResource
LockResource
LoadResource
FindResourceA
FindResourceExA
WideCharToMultiByte
MultiByteToWideChar
DeleteFileA
InterlockedDecrement
SetFileAttributesA
Process32Next
TerminateProcess
OpenProcess
Process32First
CreateToolhelp32Snapshot
FindNextFileA
FindFirstFileA
SetCurrentDirectoryA
GetModuleFileNameA
Sleep
GetVersion
WinExec
WriteFile
GetTempPathA
InterlockedIncrement
RaiseException
InitializeCriticalSection
DeleteCriticalSection
lstrlenA
GetCurrentProcess
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
SetStdHandle
LoadLibraryA
IsBadCodePtr
IsBadReadPtr
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
GetCPInfo
GetOEMCP
LCMapStringW
LCMapStringA
SetFilePointer
FlushFileBuffers
GetCurrentProcessId
GetTickCount
LocalFree
VirtualQuery
GetStartupInfoA
GetSystemInfo
GetCommandLineA
CopyFileA
QueryPerformanceCounter
IsBadWritePtr
VirtualFree
HeapCreate
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
SetLastError
VirtualAlloc
VirtualProtect
GetModuleHandleA
GetProcAddress
RemoveDirectoryA
GetSystemTimeAsFileTime
ExitProcess
RtlUnwind
LeaveCriticalSection
TlsAlloc
SetUnhandledExceptionFilter
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
EnterCriticalSection
user32
wsprintfA
SetTimer
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
DefWindowProcA
DestroyWindow
DialogBoxParamA
BeginPaint
EndPaint
PostQuitMessage
EndDialog
comdlg32
GetFileTitleA
advapi32
RegQueryValueExA
OpenProcessToken
RegCreateKeyA
RegSetValueExA
RegCloseKey
shell32
SHGetPathFromIDListA
SHGetDesktopFolder
ShellExecuteA
SHGetMalloc
ole32
CoInitialize
CoCreateInstance
StringFromGUID2
CoCreateGuid
oleaut32
SysAllocStringLen
VariantClear
VariantInit
VariantCopy
SysFreeString
SysStringByteLen
SysAllocStringByteLen
SysAllocString
GetErrorInfo
shlwapi
PathFileExistsA
Sections
.text Size: 112KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ