Static task
static1
Behavioral task
behavioral1
Sample
b723b5791b35e84b7b872671b1c324bf661dee0481d5e604c6d9ecb0d6800b76.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b723b5791b35e84b7b872671b1c324bf661dee0481d5e604c6d9ecb0d6800b76.exe
Resource
win10v2004-20220812-en
General
-
Target
b723b5791b35e84b7b872671b1c324bf661dee0481d5e604c6d9ecb0d6800b76
-
Size
152KB
-
MD5
6804bdfbe902109df0415aa58d85d417
-
SHA1
6f6d343bc6a3d21756fa6b1026223d5c75915cd2
-
SHA256
b723b5791b35e84b7b872671b1c324bf661dee0481d5e604c6d9ecb0d6800b76
-
SHA512
e22aaaba7c8583d4538da79ab0376f4f6ac5d8fc0c6d720e33180e3ff1d1d3881935deead9e661825c0393b2fdc3eb8d0e97609a8d81855af445a0d9575e596a
-
SSDEEP
3072:UcU6Q+dN6GFENPMUovrp6cqcSCb2W6pB:U+QgdpwcSq2
Malware Config
Signatures
Files
-
b723b5791b35e84b7b872671b1c324bf661dee0481d5e604c6d9ecb0d6800b76.exe windows x86
14e0049b5dfc794ff63bf6ac2c7b21ee
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RtlUnwind
HeapFree
HeapReAlloc
HeapAlloc
GetStartupInfoA
ExitProcess
RaiseException
ExitThread
HeapSize
TerminateProcess
GetACP
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetOEMCP
GetCPInfo
GlobalFlags
GetProcessVersion
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalAlloc
GlobalReAlloc
GlobalLock
GlobalHandle
GlobalUnlock
GlobalFree
TlsAlloc
LocalAlloc
GetVersion
lstrcpynA
SetLastError
lstrcmpA
SuspendThread
SetThreadPriority
ResumeThread
LocalFree
SetSystemPowerState
CreateFileA
FormatMessageA
DeviceIoControl
OutputDebugStringA
EnterCriticalSection
LeaveCriticalSection
GetCurrentThread
GetCurrentProcess
GetLastError
WideCharToMultiByte
lstrcatA
lstrcpyA
LoadLibraryA
GetProcAddress
FreeLibrary
GetModuleHandleA
GetShortPathNameA
MultiByteToWideChar
lstrlenW
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameA
lstrlenA
GetCommandLineA
lstrcmpiA
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
WaitForMultipleObjects
Sleep
ResetEvent
CloseHandle
SetEvent
WaitForSingleObject
CreateEventA
CreateThread
user32
GrayStringA
DrawTextA
TabbedTextOutA
DestroyMenu
PostQuitMessage
ClientToScreen
PtInRect
GetClassNameA
GetDC
ReleaseDC
GetSysColorBrush
LoadCursorA
IsWindowEnabled
ShowWindow
SetWindowTextA
LoadIconA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
GetClientRect
CopyRect
EnableWindow
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
PostMessageA
CharNextA
PostThreadMessageA
DispatchMessageA
GetMessageA
LoadStringA
GetMenu
GetDlgItem
GetDlgCtrlID
DefWindowProcA
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
GetWindowLongA
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
MessageBoxA
CloseDesktop
GetUserObjectInformationA
OpenInputDesktop
SetWindowsHookExA
GetCursorPos
PeekMessageA
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
SendMessageA
GetActiveWindow
TranslateMessage
UnhookWindowsHookEx
GetMenuItemID
GetMenuState
GetSubMenu
GetMenuItemCount
GetFocus
GetParent
GetNextDlgTabItem
GetWindowTextA
gdi32
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
CreateBitmap
GetDeviceCaps
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
GetObjectA
SetBkColor
SetTextColor
GetClipBox
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
OpenSCManagerA
OpenServiceA
LookupPrivilegeValueA
AdjustTokenPrivileges
GetTokenInformation
OpenThreadToken
OpenProcessToken
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
GetLengthSid
CopySid
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegOpenKeyExA
StartServiceA
StartServiceCtrlDispatcherA
ControlService
DeleteService
CreateServiceA
RegDeleteValueA
RegSetValueExA
RegCloseKey
RegQueryValueExA
SetServiceStatus
RegisterServiceCtrlHandlerA
CloseServiceHandle
comctl32
ord17
ole32
CoCreateInstance
CoRevokeClassObject
CoRegisterClassObject
CoDisconnectObject
CoInitialize
CoInitializeSecurity
CoUninitialize
oleaut32
VariantClear
SysFreeString
SysAllocString
LoadTypeLi
RegisterTypeLi
LoadRegTypeLi
SysStringLen
VariantChangeType
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ