Static task
static1
Behavioral task
behavioral1
Sample
b49980eeaea1717a4fc886f488e691423d5959d6b342dd42963505a25b67b86f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b49980eeaea1717a4fc886f488e691423d5959d6b342dd42963505a25b67b86f.exe
Resource
win10v2004-20220901-en
General
-
Target
b49980eeaea1717a4fc886f488e691423d5959d6b342dd42963505a25b67b86f
-
Size
589KB
-
MD5
471b3b768bbb8f8bd5c350fd7fb65b80
-
SHA1
bd9a798a3ac11c0d44fe3b2e570f8a9cb3b6d797
-
SHA256
b49980eeaea1717a4fc886f488e691423d5959d6b342dd42963505a25b67b86f
-
SHA512
6c851f45a6dcadb001579a326aaf331270f7463f2b84ad88dc128d9ff81c91e716e201a33c075370956c7a252be700c46a0b0ac162757ca1855fec8ae0b66f40
-
SSDEEP
12288:ZP2DYfpZf4wvpOjrEDFkDZvBTcjjhfKGNZ/LVa:bf7fUreFkLGjhflDY
Malware Config
Signatures
Files
-
b49980eeaea1717a4fc886f488e691423d5959d6b342dd42963505a25b67b86f.exe windows x86
4ef1794e2066e991439452adeea777ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NO_BIND
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_NET_RUN_FROM_SWAP
Imports
kernel32
SetStdHandle
VirtualQuery
GetProcessHeap
LCMapStringW
HeapFree
HeapQueryInformation
HeapSize
HeapReAlloc
OutputDebugStringW
WriteConsoleW
GetConsoleMode
GetConsoleCP
SetFilePointer
FreeLibrary
IsProcessorFeaturePresent
LoadLibraryW
HeapCreate
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetSystemTimeAsFileTime
QueryPerformanceCounter
SetLastError
TlsFree
GetCurrentThreadId
TlsSetValue
FlushFileBuffers
TlsAlloc
IsValidCodePage
GetCPInfo
GetOEMCP
GetACP
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
IsBadReadPtr
HeapValidate
CreateFileW
lstrcpyA
GetCurrentProcessId
CloseHandle
OutputDebugStringA
FillConsoleOutputAttribute
GetModuleHandleA
GetSystemInfo
GetConsoleScreenBufferInfo
CreateFileMappingA
LoadLibraryA
GetProcAddress
GetLastError
GetStdHandle
GlobalUnlock
SetConsoleTitleA
lstrcatA
SetConsoleCursorPosition
Sleep
GlobalAlloc
GetConsoleTitleA
GetTickCount
FlushConsoleInputBuffer
FillConsoleOutputCharacterA
GlobalLock
GetCurrentProcess
InterlockedDecrement
GetStringTypeW
WriteFile
GetModuleFileNameW
ExitProcess
GetModuleHandleW
InterlockedIncrement
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
RaiseException
DecodePointer
EncodePointer
RtlUnwind
GetStartupInfoW
HeapSetInformation
GetCommandLineA
LocalFree
WideCharToMultiByte
MultiByteToWideChar
HeapAlloc
SystemTimeToTzSpecificLocalTime
MapViewOfFile
GetLocaleInfoA
lstrlenA
GetFileSize
CreateFileA
TlsGetValue
user32
GetDlgCtrlID
DestroyIcon
GetWindowThreadProcessId
SendMessageW
SetWindowTextA
OpenClipboard
CreateWindowExW
IsWindow
CreatePopupMenu
UpdateWindow
SetClipboardData
GetClassLongA
FindWindowA
EndPaint
CloseClipboard
GetSystemMenu
FillRect
SetForegroundWindow
DeleteMenu
IsClipboardFormatAvailable
AttachThreadInput
wsprintfA
FindWindowExA
SendMessageA
BeginPaint
GetDC
GetForegroundWindow
TrackPopupMenuEx
SetRect
SetWindowLongA
MessageBoxA
BringWindowToTop
GetWindowLongA
EnableMenuItem
SetClassLongA
GetWindowContextHelpId
DefWindowProcA
GetSysColor
GetCursorPos
GetCaretPos
ShowWindow
gdi32
RestoreDC
SetTextAlign
CreatePen
MoveToEx
PatBlt
LineTo
SetWindowExtEx
CreateFontIndirectW
SetBrushOrgEx
CreateBitmap
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
Rectangle
Ellipse
FillRgn
SaveDC
EnumFontFamiliesA
CreatePatternBrush
Polyline
CreateSolidBrush
advapi32
SetEntriesInAclA
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
shell32
SHGetFileInfoA
ole32
CoTaskMemFree
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
VariantClear
VariantChangeType
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
shlwapi
StrChrA
comctl32
InitCommonControlsEx
ImageList_ReplaceIcon
activeds
ord17
gdiplus
GdipCreateBitmapFromHBITMAP
GdipSaveImageToFile
GdipDisposeImage
Sections
.text Size: 241KB - Virtual size: 241KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 114KB - Virtual size: 114KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 75KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 139KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ