Static task
static1
Behavioral task
behavioral1
Sample
b77abae56c0f9563270e589b2ce35339e030f5340f5404371eb61ca1a3d5fce6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b77abae56c0f9563270e589b2ce35339e030f5340f5404371eb61ca1a3d5fce6.exe
Resource
win10v2004-20220812-en
General
-
Target
b77abae56c0f9563270e589b2ce35339e030f5340f5404371eb61ca1a3d5fce6
-
Size
544KB
-
MD5
621c22b4ce0066057151bf25f267b190
-
SHA1
212ab590fcd3e568d6f98c937a8b40f1e5937802
-
SHA256
b77abae56c0f9563270e589b2ce35339e030f5340f5404371eb61ca1a3d5fce6
-
SHA512
983c149c664d23faf291f221b968f512c5feb9701f71320652b54bb9a1b4f613936eabe8552bfa8f0ef6cbbe08f702fc2120851e65560d01ab4913af30370e8b
-
SSDEEP
12288:6w45SLuAMp3lIe4ls6wcgh9fmvLzM8GtnI80yFzZ5R:6bSL/8VI9ls6wRK0jnI8bZL
Malware Config
Signatures
Files
-
b77abae56c0f9563270e589b2ce35339e030f5340f5404371eb61ca1a3d5fce6.exe windows x86
9481d3a6d1799a90d8a45ffeed22f102
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_GetFlags
ImageList_Write
InitCommonControlsEx
ImageList_SetBkColor
ImageList_Read
CreateUpDownControl
ImageList_AddIcon
MakeDragList
ImageList_DragMove
ImageList_GetDragImage
user32
SetFocus
ScrollWindow
RegisterClassA
CloseClipboard
DrawFrameControl
SendDlgItemMessageW
GetClassWord
EnumPropsA
RegisterClassExA
DefWindowProcA
ShowWindow
NotifyWinEvent
IsCharUpperA
DestroyWindow
CharLowerW
GetMenuDefaultItem
AnimateWindow
OemToCharBuffW
GetWindowWord
VkKeyScanExA
TranslateMessage
CreateDialogIndirectParamA
CheckRadioButton
DdeAbandonTransaction
GetNextDlgTabItem
MessageBoxA
LoadCursorA
SetMenuItemBitmaps
AppendMenuA
CreateWindowExA
advapi32
RegQueryValueExW
RegDeleteKeyA
CryptDuplicateHash
comdlg32
ChooseColorA
GetFileTitleA
PageSetupDlgW
ChooseColorW
kernel32
VirtualProtect
OpenProcess
IsValidCodePage
GetLocaleInfoA
GetFileType
GetLastError
VirtualFree
OpenMutexW
CreateMutexA
WriteFile
TerminateProcess
LocalUnlock
LCMapStringW
GetModuleHandleA
SetHandleCount
GetCurrentProcessId
CloseHandle
GetVersionExA
TlsAlloc
HeapDestroy
GetAtomNameW
GetCPInfo
GetStringTypeW
GetDriveTypeW
FreeEnvironmentStringsA
GetACP
GetCurrentThreadId
InitializeCriticalSection
SetFilePointer
CreateProcessA
GetSystemTimeAdjustment
WritePrivateProfileStringW
FlushFileBuffers
SetLastError
GetUserDefaultLCID
VirtualAlloc
MoveFileA
FormatMessageW
GetSystemTimeAsFileTime
GetAtomNameA
GetEnvironmentStrings
GetProfileIntW
GetStringTypeA
LeaveCriticalSection
SetCriticalSectionSpinCount
EnterCriticalSection
IsBadWritePtr
GetDateFormatA
GetSystemInfo
UnhandledExceptionFilter
GetStdHandle
TlsFree
FileTimeToLocalFileTime
OpenFileMappingW
GetCurrentProcess
HeapCreate
WriteConsoleInputA
HeapReAlloc
OpenFile
GetEnvironmentVariableA
TlsGetValue
ReadFile
EnumResourceLanguagesA
GetEnvironmentStringsW
GetCommandLineA
GetProcAddress
DeleteCriticalSection
GetOEMCP
SetStdHandle
FreeLibraryAndExitThread
HeapAlloc
CompareStringW
SetComputerNameA
SetEnvironmentVariableA
EnumSystemCodePagesW
SetLocaleInfoA
InterlockedExchange
OpenMutexA
LCMapStringA
CreateEventA
CreateDirectoryA
WideCharToMultiByte
HeapFree
GetLocaleInfoW
GetNamedPipeInfo
GetCurrentThread
TlsSetValue
FreeEnvironmentStringsW
OpenWaitableTimerW
SetConsoleWindowInfo
GetTimeZoneInformation
EnumSystemLocalesA
HeapSize
GetStartupInfoA
GetTimeFormatA
VirtualQuery
GetTickCount
CompareStringA
MultiByteToWideChar
IsValidLocale
GetModuleFileNameA
LoadLibraryA
QueryPerformanceCounter
RtlUnwind
CreateMailslotW
ExitProcess
Sections
.text Size: 150KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 254KB - Virtual size: 253KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ