Static task
static1
Behavioral task
behavioral1
Sample
35dd2f32ed3490f3ddfe6866805d747ee495febb162d666b9e1715513c0f0c89.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
35dd2f32ed3490f3ddfe6866805d747ee495febb162d666b9e1715513c0f0c89.exe
Resource
win10v2004-20230703-en
General
-
Target
35dd2f32ed3490f3ddfe6866805d747ee495febb162d666b9e1715513c0f0c89
-
Size
512KB
-
MD5
0ddec5fd419b341c0d55827cdc7781c2
-
SHA1
2a1d698887fa9535d82c70b1e7f4f6678f03f98d
-
SHA256
35dd2f32ed3490f3ddfe6866805d747ee495febb162d666b9e1715513c0f0c89
-
SHA512
0033ef354219e0b8d920fa38714e22dd7e9f9be45c47de4e84bad7792489196c34be5fd79b07ae0adb06a38d3e40084b673dd58b7d3d30e9cc3292d998d1d1ae
-
SSDEEP
6144:TY8inA4e/QW/um7Hi6isfnLEZtJOK17f0jqqjCLndEtz:TY8inAf/QWGYi8fnLOtJOK09es
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 35dd2f32ed3490f3ddfe6866805d747ee495febb162d666b9e1715513c0f0c89
Files
-
35dd2f32ed3490f3ddfe6866805d747ee495febb162d666b9e1715513c0f0c89.exe windows x86
7ad059b021e449b8f1fd633fe39f5641
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
VerInstallFileA
GetFileVersionInfoA
VerQueryValueA
winmm
PlaySoundA
wsock32
bind
gethostname
listen
WSAStartup
gethostbyname
inet_addr
shutdown
WSACleanup
socket
closesocket
kernel32
GlobalReAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
LeaveCriticalSection
GetProcessVersion
GetCurrentDirectoryA
SetErrorMode
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
HeapAlloc
HeapFree
RaiseException
ExitProcess
TerminateProcess
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCPInfo
GetACP
GetOEMCP
HeapReAlloc
HeapSize
GlobalHandle
GetFullPathNameA
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetDriveTypeA
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
SetStdHandle
GetLocaleInfoA
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
LocalFree
FindNextFileA
SetLastError
SetFileAttributesA
SystemTimeToFileTime
LocalFileTimeToFileTime
GetFileSize
GetShortPathNameA
GetThreadLocale
GetStringTypeExA
GetVolumeInformationA
FindFirstFileA
FindClose
LoadLibraryA
DeleteFileA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
DuplicateHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
MulDiv
GetDiskFreeSpaceA
GetFileTime
UnhandledExceptionFilter
SetFileTime
CreateDirectoryA
GetSystemDirectoryA
GetFileAttributesA
GetPrivateProfileIntA
CloseHandle
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
MultiByteToWideChar
GetTempFileNameA
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GetCurrentThreadId
LockResource
FindResourceA
LoadResource
lstrcpynA
GlobalGetAtomNameA
GlobalAddAtomA
GetVersion
CreateProcessA
WaitForSingleObject
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
CopyFileA
WritePrivateProfileStringA
MoveFileExA
GetCurrentProcess
GetLastError
WinExec
lstrlenA
GetWindowsDirectoryA
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetTempPathA
GetPrivateProfileStringA
lstrcatA
lstrcpyA
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryExA
GetVersionExA
user32
AdjustWindowRectEx
DispatchMessageA
DeferWindowPos
MapWindowPoints
SystemParametersInfoA
BeginDeferWindowPos
GetSysColor
SendDlgItemMessageA
SetWindowTextA
EnableMenuItem
CheckMenuItem
IsDialogMessageA
ModifyMenuA
GetMenuState
GetMenuCheckMarkDimensions
ShowOwnedPopups
MessageBoxA
GetCursorPos
ValidateRect
TranslateMessage
SetMenuItemBitmaps
GetDC
ReleaseDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
CharUpperA
GetMessageA
GetSysColorBrush
LoadStringA
FindWindowA
InsertMenuA
DeleteMenu
GetMenuStringA
DestroyIcon
GetWindowTextA
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassNameA
RegisterClassA
GetForegroundWindow
ScrollWindow
EndDeferWindowPos
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetWindowRect
GetNextDlgTabItem
EndDialog
CreateDialogIndirectParamA
DestroyWindow
GetLastActivePopup
BringWindowToTop
IsWindowVisible
IsIconic
GetFocus
CopyRect
ScreenToClient
SetWindowLongA
wsprintfA
GetKeyState
SetWindowPos
GetDlgCtrlID
GetMenuItemCount
GetSubMenu
GetMenuItemID
UnpackDDElParam
ReuseDDElParam
SetActiveWindow
LoadIconA
GetClassInfoA
LoadMenuA
DestroyMenu
SetFocus
GetParent
GetActiveWindow
ShowWindow
GetWindowLongA
GetDesktopWindow
GetWindow
IsWindowEnabled
PeekMessageA
PostMessageA
GetCapture
ReleaseCapture
TranslateAcceleratorA
LoadAcceleratorsA
SetRectEmpty
RegisterWindowMessageA
IsWindow
ClientToScreen
SetCursorPos
ExitWindowsEx
PtInRect
InvalidateRect
SetCursor
ShowCursor
GetClientRect
PostQuitMessage
LoadBitmapA
LoadCursorA
SetMenu
UpdateWindow
EnableWindow
SendMessageA
GetSystemMetrics
SetScrollInfo
ShowScrollBar
SetScrollRange
GetScrollPos
SetScrollPos
GetTopWindow
IsChild
SetForegroundWindow
GetPropA
SetPropA
UnhookWindowsHookEx
GetDlgItem
GetMenu
WinHelpA
EqualRect
UnregisterClassA
WindowFromPoint
gdi32
CreateCompatibleDC
GetTextExtentPointA
StretchBlt
SetTextColor
SetBkColor
GetObjectA
CreateBitmap
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
DeleteObject
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
comdlg32
GetSaveFileNameA
GetOpenFileNameA
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
RegCloseKey
OpenProcessToken
RegSetValueA
GetFileSecurityA
SetFileSecurityA
RegDeleteValueA
RegOpenKeyExA
RegCreateKeyA
RegEnumKeyA
RegDeleteKeyA
RegCreateKeyExA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryValueA
shell32
ExtractIconA
DragQueryFileA
DragFinish
SHGetFileInfoA
comctl32
ord17
ImageList_Destroy
Sections
.text Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 283KB - Virtual size: 283KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ