Static task
static1
Behavioral task
behavioral1
Sample
depends22_x86.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
depends22_x86.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
depends.chm
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
depends.chm
Resource
win10v2004-20230221-en
Behavioral task
behavioral5
Sample
depends.dll
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
depends.dll
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
depends.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
depends.exe
Resource
win10v2004-20230220-en
General
-
Target
depends22_x86.zip
-
Size
596KB
-
MD5
675ca981ddf557eb7d4550624157dbe5
-
SHA1
bfec714057e8449b0246051be99ba46a7760bab9
-
SHA256
03d73abba0e856c81ba994505373fdb94a13b84eb29e6c268be1bf21b7417ca3
-
SHA512
e0385d7cdb5d6bf76b9f23839c2ff2365e525f3e0c391c59f5fd1f2be7c85e4ff618900a1908ac9753d86942e5f9fa5a9eea3e23468d0215b02c73af357db93d
-
SSDEEP
12288:NdvBbKbWHrH1rY5bUWHpEQPRpZ0X4bMuaX6yIe4BjrdvBHKhW9rH1647vN:rJwcY5bXHdJ0XGLaX6Yod1muV
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/depends.dll unpack001/depends.exe
Files
-
depends22_x86.zip.zip
-
depends.chm.chm
-
depends.dll.dll windows x86
e918b2fe4eaab4185d6d247c01da07ef
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFullPathNameA
FreeLibrary
LoadLibraryExW
GetCommandLineA
LoadLibraryW
GetEnvironmentVariableA
GetLastError
SetLastError
GetProcAddress
DisableThreadLibraryCalls
LoadLibraryA
GetModuleFileNameA
LoadLibraryExA
GetCurrentDirectoryA
OutputDebugStringA
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
UnhandledExceptionFilter
RtlUnwind
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 482B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
depends.exe.exe windows x86
72577c4a7be8d48ac2f5adac2be876ec
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileA
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentThreadId
TerminateThread
DeleteCriticalSection
RaiseException
CreateEventA
ResumeThread
WaitForSingleObject
CloseHandle
SetLastError
CreateProcessA
GetLastError
SetEvent
WaitForDebugEvent
ContinueDebugEvent
LoadLibraryA
LoadLibraryW
LoadLibraryExA
LoadLibraryExW
GetProcAddress
GetModuleFileNameA
GetThreadContext
SetThreadContext
WideCharToMultiByte
SizeofResource
LockResource
LoadResource
FindResourceA
FreeLibrary
GetLocaleInfoA
CreateFileA
GetFullPathNameA
GetCommandLineA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetVersion
CompareStringA
lstrcmpiA
InterlockedExchange
GetStringTypeExA
CompareStringW
lstrlenA
GetFileInformationByHandle
SearchPathA
GetFileType
GetLocalTime
SetEnvironmentVariableA
GetEnvironmentVariableA
MultiByteToWideChar
GetUserDefaultLangID
CompareFileTime
GlobalUnlock
GlobalLock
GlobalAlloc
GetStartupInfoA
GetTimeFormatA
GetDateFormatA
FileTimeToSystemTime
GetSystemDefaultLangID
FileTimeToLocalFileTime
GetSystemTimeAsFileTime
GetTimeZoneInformation
GlobalMemoryStatus
GetSystemInfo
GetComputerNameA
GetCurrentProcess
GlobalAddAtomA
GlobalGetAtomNameA
GetModuleHandleA
GetCurrentProcessId
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
FreeResource
MulDiv
SetThreadPriority
SuspendThread
GetPrivateProfileIntA
WritePrivateProfileStringA
GetPrivateProfileStringA
lstrcmpA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThread
GlobalFree
GetModuleFileNameW
InterlockedDecrement
SetFileTime
GetFileTime
GetTempFileNameA
GetDiskFreeSpaceA
GlobalFlags
LocalAlloc
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
InterlockedIncrement
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
GetTickCount
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetThreadLocale
DuplicateHandle
GetVolumeInformationA
SystemTimeToFileTime
LocalFileTimeToFileTime
SetErrorMode
HeapFree
HeapAlloc
VirtualAlloc
HeapReAlloc
GetProcessHeap
RtlUnwind
ExitThread
CreateThread
HeapSize
GetACP
LCMapStringA
LCMapStringW
GetStdHandle
Sleep
HeapDestroy
HeapCreate
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetVersionExA
UnmapViewOfFile
MapViewOfFile
GetSystemDirectoryA
CreateFileMappingA
GetFileSize
SetFileAttributesA
GetWindowsDirectoryA
GetTempPathA
GetShortPathNameA
LocalFree
FormatMessageA
FlushInstructionCache
WriteProcessMemory
VirtualProtectEx
VirtualQueryEx
ReadProcessMemory
WriteFile
ReadFile
ExitProcess
DeleteFileA
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
GetDriveTypeA
GetLogicalDrives
ExpandEnvironmentStringsA
GetFileAttributesA
user32
SetCursorPos
DestroyCursor
LoadCursorA
GetCursorPos
FillRect
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
GetWindowDC
BeginPaint
EndPaint
CheckMenuItem
GetMenuState
ModifyMenuA
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
CheckDlgButton
GetDlgItemTextA
SetDlgItemTextA
IsDlgButtonChecked
IsDialogMessageA
MoveWindow
ValidateRect
PostQuitMessage
EndDialog
GetNextDlgTabItem
CreateDialogIndirectParamA
ShowOwnedPopups
InsertMenuA
AppendMenuA
GetMenuStringA
WindowFromPoint
WaitMessage
GetMenuItemInfoA
IsRectEmpty
DeleteMenu
GetSystemMenu
SetParent
GetSysColorBrush
FindWindowA
SetRect
DestroyIcon
UnregisterClassA
GetDCEx
LockWindowUpdate
EndDeferWindowPos
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
MapWindowPoints
TrackPopupMenu
SetScrollPos
GetScrollPos
SetForegroundWindow
SetCapture
RegisterClassA
DeferWindowPos
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
GetWindowPlacement
UnpackDDElParam
ReuseDDElParam
DestroyMenu
GetClassNameA
WinHelpA
SetFocus
GetWindowThreadProcessId
IsWindowEnabled
EqualRect
GetKeyState
GetDlgCtrlID
LoadIconA
SetCursor
PeekMessageA
GetCapture
ReleaseCapture
LoadAcceleratorsA
IsWindowVisible
InsertMenuItemA
CreatePopupMenu
GetClassInfoA
IntersectRect
SetRectEmpty
GetLastActivePopup
SetMenu
GetWindow
ShowWindow
AdjustWindowRectEx
RedrawWindow
SetWindowPos
GetWindowLongA
SetWindowLongA
TranslateAcceleratorA
TranslateMDISysAccel
BringWindowToTop
GetActiveWindow
DrawMenuBar
CreateWindowExA
GetMenuItemCount
DefMDIChildProcA
GetMenu
DefFrameProcA
InflateRect
SendDlgItemMessageA
IsChild
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
GetPropA
CharUpperA
OffsetRect
PtInRect
ClientToScreen
SetActiveWindow
SendMessageA
PostMessageA
SetDebugErrorLevel
UpdateWindow
MessageBoxA
GetDesktopWindow
IsWindow
RegisterWindowMessageA
IsIconic
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
RemovePropA
GetForegroundWindow
GetClassInfoExA
BeginDeferWindowPos
GetMessageA
TranslateMessage
DispatchMessageA
EnableWindow
GetParent
IsZoomed
GetClientRect
GetSystemMetrics
GetDlgItem
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
GetWindowRect
ScreenToClient
RemoveMenu
EnableMenuItem
InvalidateRect
MessageBeep
GetSubMenu
LoadMenuA
GetMessagePos
GetMessageTime
DrawFocusRect
CopyRect
GetSysColor
KillTimer
SetTimer
GetFocus
ReleaseDC
GetDC
GetMenuItemID
gdi32
SelectClipRgn
CreateRectRgn
BitBlt
GetPixel
PtVisible
RectVisible
TextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
ScaleWindowExtEx
DeleteDC
CreatePatternBrush
CreateBitmap
IntersectClipRect
CreateSolidBrush
CreateRectRgnIndirect
SetWindowExtEx
GetTextMetricsA
CreateFontA
StretchDIBits
SetRectRgn
CombineRgn
ExcludeClipRect
SetMapMode
CreateCompatibleBitmap
SetBkMode
RestoreDC
GetTextAlign
GetTextExtentPoint32A
LineTo
MoveToEx
ExtTextOutA
SetTextColor
SetBkColor
SetTextAlign
GetCharWidthA
CreateFontIndirectA
GetObjectA
DeleteObject
GetTextExtentPointA
SelectObject
GetStockObject
GetBkColor
SaveDC
PatBlt
GetClipBox
CreateCompatibleDC
GetDeviceCaps
advapi32
RegOpenKeyA
GetFileSecurityA
SetFileSecurityA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegSetValueA
RegEnumKeyA
RegQueryValueA
RegOpenKeyExA
RegCloseKey
RegDeleteKeyA
RegQueryValueExA
GetUserNameA
RegEnumValueA
RegCreateKeyA
shell32
SHGetFileInfoA
DragQueryFileA
DragFinish
DragAcceptFiles
ShellExecuteA
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHBrowseForFolderA
ShellExecuteExA
ExtractIconA
comctl32
ImageList_Draw
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comdlg32
GetFileTitleA
oleaut32
VariantClear
VariantChangeType
VariantInit
SysAllocStringLen
Sections
.text Size: 430KB - Virtual size: 430KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 107KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 249KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ