Static task
static1
Behavioral task
behavioral1
Sample
b888386bf7aba090a996001d369329469712016562ee17045a83bb578063e17d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b888386bf7aba090a996001d369329469712016562ee17045a83bb578063e17d.exe
Resource
win10v2004-20220901-en
General
-
Target
b888386bf7aba090a996001d369329469712016562ee17045a83bb578063e17d
-
Size
245KB
-
MD5
6ad64343121a4f3d87c4475ecfaf3336
-
SHA1
5274c20d76a1e162cb05d3114bafc0f1a858451e
-
SHA256
b888386bf7aba090a996001d369329469712016562ee17045a83bb578063e17d
-
SHA512
69b7993c016179627798698583b6c59cd8bf28cbfccbc26915a0bebd33ceabde1573861b9492800afdc1c585412ef4932b31e479789a76e8f8e91f9e80eee2f6
-
SSDEEP
6144:WkOLCwIi3DXUFjr5+VGkDtG2bi4fhLxfzmxQB0dN4s:cWM3Ut+VvDE2bi4fhLxSR
Malware Config
Signatures
Files
-
b888386bf7aba090a996001d369329469712016562ee17045a83bb578063e17d.exe windows x86
1e5ebcad9031aca94b16f7a4437e0729
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
GetProcAddress
FreeLibrary
FindFirstFileA
GetDiskFreeSpaceA
FindClose
LoadLibraryA
GetModuleFileNameA
GetVersion
GetVersionExA
GetSystemInfo
InterlockedIncrement
InterlockedDecrement
WinExec
GetCurrentProcess
MoveFileExA
GetWindowsDirectoryA
GetShortPathNameA
FindNextFileA
WritePrivateProfileStringA
HeapSize
HeapReAlloc
HeapAlloc
DeleteFileA
RemoveDirectoryA
CreateDirectoryA
GetLocaleInfoW
CloseHandle
GetLocaleInfoA
SetStdHandle
FlushFileBuffers
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetFilePointer
VirtualAlloc
LCMapStringW
LCMapStringA
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
SetEnvironmentVariableW
SetCurrentDirectoryA
GetFullPathNameA
GetCurrentDirectoryA
UnhandledExceptionFilter
FreeEnvironmentStringsA
WriteFile
RtlUnwind
GetStringTypeA
HeapCreate
HeapDestroy
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
ExitProcess
GetLastError
SetFileAttributesA
GetFileAttributesA
MoveFileA
GetCPInfo
GetACP
GetOEMCP
HeapFree
TerminateProcess
GetStringTypeW
GetStdHandle
SetHandleCount
VirtualFree
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WideCharToMultiByte
TlsGetValue
GetFileType
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
user32
DispatchMessageA
SendMessageA
FindWindowA
PostMessageA
TranslateMessage
GetMessageA
RegisterClassA
SetTimer
CreateWindowExA
KillTimer
DefWindowProcA
DestroyWindow
PostQuitMessage
ExitWindowsEx
MessageBoxA
GetSysColor
CreateDialogIndirectParamA
IsWindow
SetWindowPos
GetWindowRect
GetParent
SystemParametersInfoA
EndDialog
UpdateWindow
InvalidateRect
SendDlgItemMessageA
CharPrevA
CharNextA
GetSystemMetrics
SetWindowTextA
LoadIconA
BringWindowToTop
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegSetValueExA
RegCreateKeyA
RegOpenKeyExA
RegQueryValueA
RegOpenKeyA
RegSetValueA
RegDeleteKeyA
RegEnumKeyA
RegEnumKeyExA
gdi32
CreateSolidBrush
DeleteObject
SetBkColor
SetTextColor
comctl32
ord17
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 163KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE