Static task
static1
Behavioral task
behavioral1
Sample
346b4aee9176a3d41644e5205910657e66fee430969b116696f252b1ac0cceb2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
346b4aee9176a3d41644e5205910657e66fee430969b116696f252b1ac0cceb2.exe
Resource
win10v2004-20220812-en
General
-
Target
346b4aee9176a3d41644e5205910657e66fee430969b116696f252b1ac0cceb2
-
Size
389KB
-
MD5
e1f70c9d2bcdea490128091e8a13881b
-
SHA1
3f18cf36608f919acc6eb9770169bd1890d4fa27
-
SHA256
346b4aee9176a3d41644e5205910657e66fee430969b116696f252b1ac0cceb2
-
SHA512
9b2d94cd582014c04261e1903f71d5a74c6fb0a191e5a97829cc28b6a416a94d8b557f1f72ef75bfa90426712f9963e8dc4f0767174ae1a5d8431f0fd83e7a34
-
SSDEEP
6144:PCyrq/m69/8jJayJkYKk/zsiWJUsnT37OA9IyMGIsEOAvDUeIyMGIsEOAvDUlG:y/SJ3J54iJsT3ddMGIjDpdMGIjDg
Malware Config
Signatures
Files
-
346b4aee9176a3d41644e5205910657e66fee430969b116696f252b1ac0cceb2.exe windows x86
3428ab07caa35562b869a9b980cbf943
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
libeay32
ord82
ord66
ord202
ord1882
ord395
ssleay32
ord78
ord8
ord48
ord108
ord183
ord30
ord24
ord110
ord15
ord87
ord295
ord222
ord43
ord21
ord12
ord75
ord141
ord6
ord59
ord35
ord112
ord58
mfc100
ord1316
ord1313
ord300
ord13294
ord5207
ord4499
ord977
ord10906
ord421
ord13518
ord322
ord1480
ord1437
ord849
ord11153
ord11184
ord7355
ord11172
ord5238
ord3409
ord1890
ord948
ord1982
ord6112
ord888
ord12672
ord13481
ord13484
ord13482
ord13485
ord13480
ord13483
ord7144
ord11413
ord13181
ord10922
ord14075
ord1732
ord7091
ord11806
ord3618
ord3676
ord8486
ord13299
ord7073
ord13301
ord11421
ord11420
ord2163
ord9399
ord4724
ord13767
ord7141
ord4078
ord11726
ord11787
ord9449
ord11180
ord7510
ord1288
ord6835
ord7584
ord9281
ord5098
ord4283
ord6628
ord895
ord11103
ord2944
ord2945
ord2872
ord3484
ord1483
ord2338
ord5253
ord12482
ord10672
ord6128
ord13300
ord7074
ord13302
ord2661
ord3984
ord13980
ord5123
ord3991
ord4401
ord4368
ord4364
ord4398
ord4419
ord4377
ord4406
ord4415
ord4385
ord4389
ord4393
ord4381
ord4410
ord4373
ord1514
ord1507
ord1509
ord1503
ord10883
ord3395
ord11025
ord8235
ord13973
ord13972
ord14045
ord14062
ord14058
ord14060
ord14061
ord14059
ord1292
ord2417
ord7349
ord9286
ord2878
ord2881
ord12535
ord5534
ord5444
ord8304
ord7357
ord4772
ord6888
ord6898
ord6897
ord4606
ord4774
ord4625
ord4881
ord8439
ord5095
ord4903
ord4622
ord310
ord901
ord1294
ord266
ord265
ord1296
ord11744
ord7876
ord11781
ord7487
ord7581
ord2626
ord305
ord5242
ord2611
ord2061
ord13304
ord2846
ord4785
ord12868
ord12865
ord7871
ord7266
ord3390
ord1900
ord5875
ord3475
ord4344
ord2187
ord3491
ord3746
ord7863
ord1929
ord869
ord12095
ord1267
ord2973
ord2974
ord3620
ord9475
ord10360
ord10007
ord8137
ord1496
ord11188
ord11190
ord12644
ord2847
ord8305
ord2416
ord12531
ord5532
ord11067
ord10030
ord13306
ord788
ord1210
ord3254
ord423
ord979
ord4936
ord4939
ord7317
ord2525
ord4188
ord4207
ord5805
ord385
ord11108
ord8330
ord6680
ord1448
ord316
ord12962
ord11791
ord5776
ord5837
ord3439
ord2752
ord11060
ord946
ord906
ord2090
ord2040
ord1940
ord323
ord1297
ord8351
ord9994
ord2088
ord6217
ord11154
ord8070
msvcr100
_setmbcp
memcpy
memset
sprintf
_controlfp_s
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
_crt_debugger_hook
?terminate@@YAXXZ
__set_app_type
_fmode
_commode
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_onexit
_lock
__dllonexit
_unlock
__CxxFrameHandler3
isalpha
isxdigit
fclose
realloc
vfprintf
fwrite
_vsnprintf
rand
fprintf
fread
fgets
isprint
tolower
isalnum
_errno
_snprintf
_wfopen
fflush
strchr
__iob_func
strerror
calloc
isspace
strncmp
_atoi64
sscanf
_CxxThrowException
fputc
wcschr
ldiv
printf
strncpy
memchr
exit
atof
_purecall
atoi
_vsnprintf_s
sprintf_s
malloc
free
memmove
??0exception@std@@QAE@ABV01@@Z
??0exception@std@@QAE@ABQBD@Z
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
kernel32
OutputDebugStringA
GetLocalTime
RemoveDirectoryA
Sleep
IsProcessorFeaturePresent
CloseHandle
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStartupInfoW
HeapSetInformation
InterlockedCompareExchange
InterlockedExchange
DecodePointer
EncodePointer
LocalAlloc
LocalFree
MultiByteToWideChar
WideCharToMultiByte
SetHandleInformation
GetCurrentProcess
SystemTimeToFileTime
GetPrivateProfileStringA
GetFileAttributesA
GetModuleFileNameA
CreateThread
DeleteFileA
TerminateThread
user32
SetForegroundWindow
UpdateWindow
GetSystemMetrics
AppendMenuA
CreatePopupMenu
GetCursorPos
LoadIconW
SendMessageA
GetClientRect
DrawIcon
LoadIconA
IsIconic
TrackPopupMenu
GetSystemMenu
EnableWindow
advapi32
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
RegQueryValueExW
shell32
Shell_NotifyIconA
SHGetSpecialFolderPathA
comctl32
InitCommonControlsEx
shlwapi
PathRemoveFileSpecA
msvcp100
?_Xlength_error@std@@YAXPBD@Z
?_Xfunc@tr1@std@@YAXXZ
?_Xout_of_range@std@@YAXPBD@Z
evoucherdll
??0eLog@@QAE@XZ
??1eLog@@QAE@XZ
?setLevel@eLog@@QAEXH@Z
?info@eLog@@QAAXPBDZZ
?error@eLog@@QAAXPBDZZ
?GbkToUtf8@CCharCode@@SA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@V23@@Z
ws2_32
htons
ntohs
getsockname
accept
setsockopt
sendto
recv
bind
socket
__WSAFDIsSet
closesocket
send
getsockopt
listen
WSAGetLastError
select
htonl
ntohl
recvfrom
WSAStartup
inet_ntoa
connect
ioctlsocket
getpeername
Sections
.text Size: 133KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 203KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ