Static task
static1
Behavioral task
behavioral1
Sample
b5b8ea7cf98b6f88e1e5805d123ccf5fa43e12a221769705393c8bf5c93c3848.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b5b8ea7cf98b6f88e1e5805d123ccf5fa43e12a221769705393c8bf5c93c3848.exe
Resource
win10v2004-20220901-en
General
-
Target
b5b8ea7cf98b6f88e1e5805d123ccf5fa43e12a221769705393c8bf5c93c3848
-
Size
349KB
-
MD5
4ef5165879ea0d29737ab3dc9250b742
-
SHA1
ba3a0dd8e64930d530054f15e0558f33cfcbcbac
-
SHA256
b5b8ea7cf98b6f88e1e5805d123ccf5fa43e12a221769705393c8bf5c93c3848
-
SHA512
243b98cd6fb02be82e05c7945db3b8875260b2b6f8eee926acb0db97807606e96b82e532c25457d87f1fb7a5d0366301b21298359cef8ead702372f56616266b
-
SSDEEP
6144:S69I9Vv6vPMXciHqyolPeBq5MpOLOGi3ubEowx+x1P1:S698I9iKpF5swi3o1
Malware Config
Signatures
Files
-
b5b8ea7cf98b6f88e1e5805d123ccf5fa43e12a221769705393c8bf5c93c3848.exe windows x86
9ce6f7a25967bb21ed255b6256f8880b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DdeConnectList
CreateWindowExA
ShowWindow
TileChildWindows
ShowScrollBar
RegisterClassA
MessageBoxW
EnumPropsExA
ChangeDisplaySettingsA
RegisterClassExA
ValidateRgn
DefWindowProcA
SetPropW
DestroyWindow
comctl32
ImageList_DragShowNolock
CreateStatusWindow
InitCommonControlsEx
ImageList_GetIconSize
ImageList_GetDragImage
ImageList_GetImageInfo
ImageList_SetFilter
ImageList_DrawEx
DrawInsert
MakeDragList
ImageList_DragEnter
ImageList_Duplicate
ImageList_LoadImageW
ImageList_DrawIndirect
ImageList_SetIconSize
CreatePropertySheetPage
ImageList_GetFlags
kernel32
InitializeCriticalSection
LCMapStringW
SetConsoleOutputCP
GetCommandLineW
FreeEnvironmentStringsA
GetStartupInfoA
GetStdHandle
VirtualQuery
GetStartupInfoW
SetFilePointer
CompareStringW
EnumSystemLocalesA
WriteProfileStringW
GetLongPathNameW
GetCurrentThreadId
ExitProcess
GetModuleFileNameA
TransactNamedPipe
CreateMailslotA
LoadLibraryA
InterlockedDecrement
GetStringTypeW
GetProfileStringW
GetProcAddress
SetStdHandle
GetModuleHandleA
MoveFileExA
HeapDestroy
GetCurrentProcessId
VirtualQueryEx
HeapFree
SetHandleCount
Sleep
FindClose
LoadLibraryW
RtlUnwind
TlsGetValue
TlsAlloc
LCMapStringA
HeapAlloc
HeapReAlloc
GetCPInfo
DeleteCriticalSection
HeapCreate
LocalLock
TlsSetValue
VirtualFree
FreeEnvironmentStringsW
MapViewOfFile
WriteFile
WideCharToMultiByte
FlushFileBuffers
ReadFile
InterlockedIncrement
GetLocalTime
TerminateProcess
OpenMutexA
RtlMoveMemory
VirtualProtect
IsBadWritePtr
GetModuleFileNameW
GetCommandLineA
EnterCriticalSection
GetConsoleScreenBufferInfo
CompareStringA
GetCurrentProcess
SetEnvironmentVariableA
GetTickCount
GetTimeZoneInformation
GetVersion
GetCurrentThread
InterlockedExchange
GetSystemTimeAsFileTime
CreateMutexA
QueryPerformanceCounter
GetStringTypeA
GetFileType
MultiByteToWideChar
GetSystemTime
VirtualAlloc
GetEnvironmentStrings
SetSystemTime
GetEnvironmentStringsW
UnhandledExceptionFilter
SetLastError
CloseHandle
LeaveCriticalSection
GetLastError
GetProcessHeap
lstrcmp
TlsFree
GetOEMCP
Sections
.text Size: 182KB - Virtual size: 181KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 58KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ