Static task
static1
Behavioral task
behavioral1
Sample
b876331b165b5bb681dba06eac08b631f5599fdd5bc7ba506646c636ebaeb243.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b876331b165b5bb681dba06eac08b631f5599fdd5bc7ba506646c636ebaeb243.exe
Resource
win10v2004-20220901-en
General
-
Target
b876331b165b5bb681dba06eac08b631f5599fdd5bc7ba506646c636ebaeb243
-
Size
148KB
-
MD5
6ed94559128d8e3eb4dcefe5834d12f0
-
SHA1
0d00222bb6cfea548e607466a21b6d43021db53f
-
SHA256
b876331b165b5bb681dba06eac08b631f5599fdd5bc7ba506646c636ebaeb243
-
SHA512
91817b11849d745726ff4db8b59098be11269b8716074eecd967516fe02c885bf5257077f9435ffb3c7d7711d60ad45fc91a2ff84684e142bd513a3f9743f7f5
-
SSDEEP
1536:ZYoo9TE4MdAaRSkJc2kxrXvbFCZXz3eJXUn3h0sb1kO4R7qjh3rmKPN:Z6/Mdtch/XUnvZ4EjZqMN
Malware Config
Signatures
Files
-
b876331b165b5bb681dba06eac08b631f5599fdd5bc7ba506646c636ebaeb243.exe windows x86
94ba6b81141dcc234f355243a2aedcc3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesW
GetModuleFileNameW
GetModuleHandleW
GetPrivateProfileIntW
GetPrivateProfileStringW
GetStringTypeExW
GetSystemDirectoryW
GetTempFileNameW
GetTempPathW
GetTimeFormatW
GetVersionExW
LoadLibraryExW
lstrcatW
GetProfileStringW
lstrcpyW
lstrcpynW
OpenEventW
OpenFileMappingW
SearchPathW
UnmapViewOfFile
SetEvent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetLocaleInfoA
GetNumberFormatA
OpenEventA
lstrcmpW
LocalAlloc
LocalFree
LoadResource
LockResource
WaitForSingleObject
lstrlenA
GetModuleHandleA
GetCurrentProcessId
MapViewOfFile
GetLastError
LoadLibraryExA
DeviceIoControl
GetCurrentThreadId
CreateThread
Sleep
SetCurrentDirectoryW
lstrlenW
LoadLibraryW
GetProcessHeap
HeapFree
OpenProcess
lstrcmpiW
SetProcessWorkingSetSize
GetExitCodeProcess
CloseHandle
GetTickCount
GetProcAddress
FreeLibrary
WritePrivateProfileStringW
GetDateFormatW
FindResourceExW
ExpandEnvironmentStringsW
DeleteFileW
CreateProcessW
CreateMutexW
CreateFileMappingW
CreateFileW
CreateEventW
CreateDirectoryW
CompareStringW
GetVersionExA
CreateEventA
GetStartupInfoA
user32
GetWindowTextW
GetWindowTextLengthW
InsertMenuW
EndDialog
SetForegroundWindow
GetLastActivePopup
EnableWindow
ShowWindow
TrackPopupMenu
SetMenuDefaultItem
DestroyWindow
GetCursorPos
SetWindowPos
SystemParametersInfoA
GetWindowRect
IsWindowVisible
IsWindow
MsgWaitForMultipleObjects
GetDlgCtrlID
ChildWindowFromPointEx
ScreenToClient
GetDlgItem
SetDlgItemTextA
GetParent
EnumThreadWindows
GetWindowThreadProcessId
DestroyMenu
GetMenuItemCount
wvsprintfW
wsprintfW
WinHelpW
UnregisterClassW
SetWindowTextW
SetWindowLongW
SetDlgItemTextW
RegisterClassExW
LoadStringW
LoadMenuW
LoadImageW
LoadIconW
LoadCursorW
wsprintfA
GetSubMenu
GetWindowLongW
GetDlgItemTextW
GetClassLongW
FindWindowExW
DialogBoxParamW
DefWindowProcW
CreateWindowExW
CreateDialogParamW
CharUpperW
CharNextW
CharPrevW
CharLowerW
CallWindowProcW
IsCharAlphaA
advapi32
ImpersonateLoggedOnUser
RevertToSelf
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
GetUserNameW
OpenProcessToken
RegCloseKey
CreateProcessAsUserW
msvcrt
_getch
Sections
.text Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ