Static task
static1
Behavioral task
behavioral1
Sample
b9cb1ce836b4b0072bd245a14d28676ba227ef038179090c44c0b8cd5e599bd3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b9cb1ce836b4b0072bd245a14d28676ba227ef038179090c44c0b8cd5e599bd3.exe
Resource
win10v2004-20220812-en
General
-
Target
b9cb1ce836b4b0072bd245a14d28676ba227ef038179090c44c0b8cd5e599bd3
-
Size
213KB
-
MD5
6f2d3a762279b58a791eb33a231e9f70
-
SHA1
5bb57daecea4a6cc1e6ade482b6b68746b04cf8a
-
SHA256
b9cb1ce836b4b0072bd245a14d28676ba227ef038179090c44c0b8cd5e599bd3
-
SHA512
0e41f701838c80f1c1bae2245d05bb898edbc42487578e97d6bcba09644e9e1c09fd61d958506a35ab5d426c158d4358755fe0a57587b44fb10ec2d4cf7eb9ff
-
SSDEEP
3072:u+fGbVZ9p24akr2HalKuJDc5Taqewrgi8V12gh0L99ByuYQ/UFq6NAS+SBy9EPUu:i9p2LkrNc9trg1fa9JULsSB1CJluLjn
Malware Config
Signatures
Files
-
b9cb1ce836b4b0072bd245a14d28676ba227ef038179090c44c0b8cd5e599bd3.exe windows x86
9b8156d635ddda448b6fd740c6747658
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetAsyncKeyState
ReleaseDC
GetWindowRect
CreateDialogParamW
GetClientRect
DestroyWindow
CheckDlgButton
GetDlgItemInt
GetDC
ClientToScreen
DefWindowProcW
GetWindowLongW
IsRectEmpty
SetDlgItemInt
GetDlgItem
EnableWindow
LoadCursorW
SetWindowLongW
DispatchMessageW
SetDlgItemTextW
InvalidateRect
SetCursor
PeekMessageW
IsWindowVisible
IsWindow
ShowWindow
CheckRadioButton
GetDesktopWindow
LoadStringW
MoveWindow
SendMessageW
TranslateMessage
msoeacct
DllGetClassObject
GetDllMajorVersion
ValidEmailAddress
DllCanUnloadNow
HrCreateAccountManager
kernel32
SetLastError
GetQueuedCompletionStatus
GetProcessHeap
GetFileSize
GetProfileIntA
SetUnhandledExceptionFilter
InitializeCriticalSection
GetLastError
GetProcAddress
WriteFile
lstrcmpW
CreateFileW
EnterCriticalSection
GetDiskFreeSpaceW
GetVersionExW
GetPrivateProfileStringW
lstrcpynW
GlobalFree
LoadLibraryW
lstrlenW
FreeLibrary
IsBadWritePtr
ResetEvent
GetCurrentProcess
GetCurrentThread
CreateEventW
MultiByteToWideChar
WaitForSingleObject
SetThreadPriority
GetModuleFileNameA
SetFilePointer
lstrlenA
WaitForMultipleObjects
GetFullPathNameW
GlobalHandle
InterlockedExchange
IsBadCodePtr
lstrcmpiW
GlobalMemoryStatus
ReleaseSemaphore
GetSystemTimeAsFileTime
GetTickCount
GlobalAlloc
HeapAlloc
GlobalUnlock
GetThreadPriority
SetEvent
LeaveCriticalSection
GetFileAttributesW
InterlockedDecrement
CreateThread
GetACP
HeapFree
GetCurrentProcessId
QueryPerformanceCounter
GlobalFindAtomW
CloseHandle
VirtualFree
SetEndOfFile
lstrcpyW
InterlockedIncrement
ReadFile
MulDiv
DeleteCriticalSection
WideCharToMultiByte
lstrcpyA
CreateSemaphoreW
GlobalLock
IsBadReadPtr
oleaut32
VarBstrFromR4
VarBstrFromI1
VarBstrFromUI2
VarBstrFromI2
VarBstrFromCy
VarBstrFromDate
VarBstrFromDec
VarBstrFromR8
VarBstrFromUI1
VarBstrFromI8
VarBstrFromUI8
VarBstrFromDisp
VarBstrFromI4
VarBstrFromUI4
msls31
LssbGetNumberDnodesInSubline
LsCompressSubline
LssbGetVisibleDcpInSubline
LssbGetObjDimSubline
LssbGetPlsrunsFromSubline
LssbGetDurTrailWithPensInSubline
msnetobj
DllGetClassObject
DllRegisterServer
DllCanUnloadNow
Sections
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ