Static task
static1
Behavioral task
behavioral1
Sample
342aac571e7d40dab3cadfdceb38cc48319764567a39449689ddcdf974601855.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
342aac571e7d40dab3cadfdceb38cc48319764567a39449689ddcdf974601855.exe
Resource
win10v2004-20220812-en
General
-
Target
342aac571e7d40dab3cadfdceb38cc48319764567a39449689ddcdf974601855
-
Size
773KB
-
MD5
3d7a7a7e17cf2c85ed7ebaf7eac0ad1c
-
SHA1
813f352be00a42af7e93cad510f82f229c39590a
-
SHA256
342aac571e7d40dab3cadfdceb38cc48319764567a39449689ddcdf974601855
-
SHA512
72e155dfa0862a3d5e18448a21beebb89335ce7f4f945d175a0d04ab93f0e55af94ce0b5ddc7f65e05cef4fa7373a866d855e8b71a88b6484af5f03f87e7baa7
-
SSDEEP
12288:CzNsvG/6sSBBUqyHpDKv3S+TiKUI2IvyY87j0eTZVIbOvnj2:CzNsvG/6ZUDHpDKv3xTPUbIGf0el8Gj2
Malware Config
Signatures
Files
-
342aac571e7d40dab3cadfdceb38cc48319764567a39449689ddcdf974601855.exe windows x86
3128951df3a12cbfdb8e4540c6828c00
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
EnterCriticalSection
GetTempFileNameW
GetCurrentProcess
GetModuleFileNameW
GetFileAttributesW
MulDiv
LeaveCriticalSection
FlushInstructionCache
RaiseException
GetLastError
FormatMessageW
DeleteFileW
LocalFree
SetLastError
WaitForSingleObject
CloseHandle
FindFirstFileW
WideCharToMultiByte
FindClose
MapViewOfFileEx
LockResource
LoadResource
GetTickCount
GetPrivateProfileIntW
CreateProcessW
GetPrivateProfileStringW
GetExitCodeProcess
ReadFile
GetProcessHeap
FindResourceExW
SizeofResource
GetFileSize
lstrlenW
GetSystemWindowsDirectoryW
OutputDebugStringW
FindResourceW
HeapFree
UnmapViewOfFile
GetSystemWow64DirectoryW
CreateFileW
FindNextFileW
InterlockedDecrement
lstrcpynW
GetVolumeNameForVolumeMountPointW
GetDiskFreeSpaceExW
GetTempPathW
GetVersionExW
ExpandEnvironmentStringsW
InitializeCriticalSection
FreeLibrary
CreateThread
GetModuleHandleW
DuplicateHandle
Sleep
GetCommandLineW
SetEvent
CreateEventW
OpenProcess
GetProcAddress
LoadLibraryW
DeleteCriticalSection
InterlockedIncrement
GetLocalTime
GetCurrentProcessId
GetFileAttributesExW
GetFullPathNameW
CreateDirectoryW
SetFileTime
DeviceIoControl
SetFileAttributesW
SetFilePointerEx
WriteFile
FlushFileBuffers
LocalAlloc
GetVolumeInformationW
ExpandEnvironmentStringsA
LoadLibraryA
InterlockedExchange
GetVersionExA
HeapDestroy
HeapAlloc
HeapReAlloc
HeapSize
InterlockedCompareExchange
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
GetACP
GetLocaleInfoA
GetThreadLocale
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitThread
GetStartupInfoW
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
ExitProcess
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
GetCPInfo
GetOEMCP
IsValidCodePage
HeapCreate
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
QueryPerformanceCounter
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetStringTypeA
GetStringTypeW
CreateFileA
SetEndOfFile
Sections
.text Size: 204KB - Virtual size: 203KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 392KB - Virtual size: 389KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ