Static task
static1
Behavioral task
behavioral1
Sample
b590121571e7cfb640a6518969af1117256e7c6ed2113b1ebd66bcd87dc60933.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b590121571e7cfb640a6518969af1117256e7c6ed2113b1ebd66bcd87dc60933.exe
Resource
win10v2004-20220901-en
General
-
Target
b590121571e7cfb640a6518969af1117256e7c6ed2113b1ebd66bcd87dc60933
-
Size
334KB
-
MD5
4ea725fbcc6defee5eff157ad90f9940
-
SHA1
b2f7cd176f8b094fa6becd66e1bd7e4e42adc314
-
SHA256
b590121571e7cfb640a6518969af1117256e7c6ed2113b1ebd66bcd87dc60933
-
SHA512
b8fd1004643456a91bde9c7b580c66e77bbaa38d4620c42af9f1419e6dd6a088a1a66fd31c07bf1e16221d21e74140282a805e06d7346e15cc3b74d257870db6
-
SSDEEP
6144:NFvrj/DWhmcprDQDlmWCXhMgfMlyPAnaGh:TT+hBprDglCXhMy
Malware Config
Signatures
Files
-
b590121571e7cfb640a6518969af1117256e7c6ed2113b1ebd66bcd87dc60933.exe windows x86
74eb1fb54d6e06a02b813af0eb1dcffc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
psapi
EnumProcesses
GetModuleBaseNameA
advapi32
RegCloseKey
RegCreateKeyA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyA
RegEnumValueA
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
comctl32
_TrackMouseEvent
comdlg32
GetOpenFileNameA
GetSaveFileNameA
gdi32
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
DeleteObject
GetDIBits
GetDeviceCaps
SelectObject
kernel32
AddAtomA
CloseHandle
CreateProcessA
CreateThread
ExitProcess
FindAtomA
GetAtomNameA
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeA
GetExitCodeProcess
GetFileAttributesA
GetFullPathNameA
GetLastError
GetModuleFileNameA
GetModuleHandleA
OpenProcess
SetUnhandledExceptionFilter
Sleep
TerminateProcess
WaitForSingleObject
msvcrt
_chdir
_chmod
_getcwd
_mkdir
_putenv
_rmdir
_stat
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_cexit
_errno
_findclose
_findfirst
_findnext
_fullpath
_iob
_isctype
_onexit
_pctype
_setjmp
_setmode
abort
acos
asin
atexit
atof
ceil
cosh
exit
fclose
fflush
fgets
floor
fmod
fopen
fprintf
fputs
fread
free
fseek
ftell
fwrite
getenv
localtime
log10
longjmp
malloc
memcpy
memmove
memset
pow
printf
remove
rename
signal
sinh
sprintf
sscanf
strchr
strcmp
strcpy
strftime
strlen
strrchr
system
tan
tanh
time
toupper
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
user32
CallNextHookEx
ClientToScreen
DispatchMessageA
GetActiveWindow
GetAsyncKeyState
GetClientRect
GetCursorPos
GetDesktopWindow
GetFocus
GetKeyState
GetParent
GetWindowDC
GetWindowLongA
IsDialogMessageA
MessageBoxA
MsgWaitForMultipleObjects
PeekMessageA
PostThreadMessageA
ReleaseCapture
ReleaseDC
ScreenToClient
SendMessageA
SetCapture
SetCursorPos
SetFocus
SetWindowsHookExA
ShowCursor
TranslateMessage
mouse_event
winmm
timeBeginPeriod
timeEndPeriod
timeGetTime
timeKillEvent
timeSetEvent
wsock32
WSACleanup
WSAGetLastError
WSAStartup
__WSAFDIsSet
accept
bind
closesocket
connect
gethostbyaddr
gethostbyname
getpeername
getsockname
getsockopt
htonl
htons
inet_addr
inet_ntoa
ioctlsocket
listen
ntohl
ntohs
recv
recvfrom
select
send
sendto
setsockopt
shutdown
socket
iphlpapi
GetAdaptersInfo
Sections
.text Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
code Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
data Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 33KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 108KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE