Static task
static1
Behavioral task
behavioral1
Sample
b56d613df135fa85d9b9f7ad74abe2af5ad07b4360d2f2e9afc5eec54247f499.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b56d613df135fa85d9b9f7ad74abe2af5ad07b4360d2f2e9afc5eec54247f499.exe
Resource
win10v2004-20220901-en
General
-
Target
b56d613df135fa85d9b9f7ad74abe2af5ad07b4360d2f2e9afc5eec54247f499
-
Size
71KB
-
MD5
66601c9e8d6be2f70a2904dab01bb630
-
SHA1
0a4ac07c3e068502b99333e9d8f6dbf96f9bf448
-
SHA256
b56d613df135fa85d9b9f7ad74abe2af5ad07b4360d2f2e9afc5eec54247f499
-
SHA512
30e87b2a41770d85d0d6c11965772aeb61c39d3b88b0ba32d83ef124de7bdf8604e62002dcc1ba4d48c2bd9be36b18f100a5cdb51e146407b6cdbd9c2e20e2f8
-
SSDEEP
1536:pt8gIDTuBpu0r6bTYA4U9lVmb5Flsuh/sWUv4weCYV:vuDapua6b4KVm6uh0W28
Malware Config
Signatures
Files
-
b56d613df135fa85d9b9f7ad74abe2af5ad07b4360d2f2e9afc5eec54247f499.exe windows x86
e2ba87664fb1d533e6a4533c49d5a990
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CreateFileW
GlobalFree
CreateDirectoryW
LoadLibraryExW
lstrcatW
OpenProcess
lstrcpynW
SetFileAttributesW
WritePrivateProfileStringW
CreateThread
GetFileAttributesW
GetFileSize
SetFilePointer
GetFullPathNameW
CopyFileW
lstrlenW
lstrcmpW
lstrcmpiW
lstrcpynA
GetDiskFreeSpaceW
lstrcpyA
WideCharToMultiByte
SetCurrentDirectoryW
GetExitCodeProcess
FindFirstFileW
GetSystemDirectoryW
RemoveDirectoryW
GlobalLock
SearchPathW
ReadFile
FreeLibrary
SetFileTime
GetVersion
FindClose
MulDiv
GetWindowsDirectoryW
GetModuleHandleA
MoveFileW
GetCommandLineW
GetShortPathNameW
WriteFile
SetErrorMode
CreateProcessW
MultiByteToWideChar
GlobalAlloc
GetPrivateProfileStringW
DeleteFileW
GetVersionExW
GetTempFileNameW
GetModuleHandleW
WaitForSingleObject
Sleep
FindNextFileW
GlobalUnlock
ExpandEnvironmentStringsW
GetLastError
lstrcmpiA
CloseHandle
CompareFileTime
GetVersionExA
VirtualProtect
LoadLibraryExA
LoadLibraryA
VirtualProtectEx
GetProcAddress
SetLastError
LoadLibraryW
GlobalFindAtomA
GetProcessHeap
GetCurrentProcess
lstrlenA
lstrcmpA
GetModuleFileNameW
ExitProcess
user32
GetSystemMetrics
GetSystemMenu
ScreenToClient
SetCursor
DialogBoxParamW
EnableWindow
CheckDlgButton
GetWindowRect
IsWindow
CloseClipboard
EnableMenuItem
SystemParametersInfoW
SetClassLongW
wsprintfW
CharNextW
GetMessagePos
LoadBitmapW
SetDlgItemTextW
CharPrevW
CreateDialogParamW
ShowWindow
GetAsyncKeyState
LoadCursorW
SetClipboardData
TrackPopupMenu
SetWindowPos
PostQuitMessage
CharUpperW
SetWindowTextW
CreateWindowExW
DispatchMessageW
PeekMessageW
SetWindowLongW
SetForegroundWindow
GetWindowLongW
GetDlgItem
GetDC
IsWindowVisible
CallWindowProcW
DestroyWindow
SendMessageTimeoutW
IsDlgButtonChecked
OpenClipboard
EndDialog
SetTimer
CharNextA
GetClassInfoW
AppendMenuW
wsprintfA
wvsprintfW
MessageBoxIndirectW
GetDlgItemTextW
LoadImageW
GetSysColor
RegisterClassW
ExitWindowsEx
EmptyClipboard
CreatePopupMenu
IsWindowEnabled
gdi32
SetBkMode
SetBkColor
CreateFontIndirectW
DeleteObject
GetDeviceCaps
SetTextColor
CreateBrushIndirect
SelectObject
winspool.drv
SetPrinterA
advapi32
RegEnumKeyW
RegQueryValueExW
RegCreateKeyExW
RegDeleteKeyW
RegEnumValueW
RegOpenKeyExW
RegDeleteValueW
RegCloseKey
shell32
SHGetFileInfoW
SHFileOperationW
SHGetSpecialFolderLocation
SHBrowseForFolderW
ShellExecuteW
SHGetPathFromIDListW
comctl32
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
ord17
setupapi
SetupAddSectionToDiskSpaceListA
Sections
CODE Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ