Static task
static1
Behavioral task
behavioral1
Sample
b5fcfddc46d3dfa0b01e492d7aee4d7e9b1c6dafdf4e85c946b04b12c9d02cc4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b5fcfddc46d3dfa0b01e492d7aee4d7e9b1c6dafdf4e85c946b04b12c9d02cc4.exe
Resource
win10v2004-20220812-en
General
-
Target
b5fcfddc46d3dfa0b01e492d7aee4d7e9b1c6dafdf4e85c946b04b12c9d02cc4
-
Size
718KB
-
MD5
6eb3f13ddc8522ec83d2b71ebbfc8bc0
-
SHA1
b158c3ee05765fb6f0766e6f506f8f64a9467335
-
SHA256
b5fcfddc46d3dfa0b01e492d7aee4d7e9b1c6dafdf4e85c946b04b12c9d02cc4
-
SHA512
c425e842f053319946cb57ab42cec36e826406d350cf8de0b1debbfc009cf4b4c0548f089a8a111af31d871013aeb1b6a5a8631b87c617d443c5834d6a367a16
-
SSDEEP
12288:gfUJX5V2CwCd9J5hsYteNMs5mk/f8HnD1fk7quBo/fkj:SU95kCTCYtyMYmk/EG7quBo/
Malware Config
Signatures
Files
-
b5fcfddc46d3dfa0b01e492d7aee4d7e9b1c6dafdf4e85c946b04b12c9d02cc4.exe windows x64
c3cd51c04d78d7edb3730db7630ee675
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
DeleteFileW
CreateDirectoryA
GetModuleFileNameA
MultiByteToWideChar
GetVersionExA
FindResourceA
FreeLibrary
ExpandEnvironmentStringsA
LoadLibraryA
LoadLibraryExA
CompareStringA
WideCharToMultiByte
IsDBCSLeadByte
GetCPInfo
GetCurrentDirectoryA
CopyFileA
GetEnvironmentVariableA
CreateProcessA
GetTempPathA
WritePrivateProfileStringA
GetShortPathNameA
GetWindowsDirectoryA
MoveFileExA
RemoveDirectoryA
SetCurrentDirectoryA
Sleep
GetProcessHeap
DeleteFileA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetConsoleMode
GetConsoleCP
HeapSize
FlsAlloc
GetCurrentThreadId
FlsFree
FlsSetValue
FlsGetValue
DecodePointer
EncodePointer
InitializeCriticalSectionAndSpinCount
GetVersion
RtlUnwindEx
DeleteCriticalSection
SetHandleCount
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
MoveFileA
SetFileAttributesA
GetFileAttributesW
GetFileAttributesA
GetProcAddress
WriteFile
SetLastError
GetStdHandle
ReadFile
CreateFileW
CreateFileA
GetFileType
SetEndOfFile
SetFilePointer
GetLastError
FlushFileBuffers
CloseHandle
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapCreate
HeapSetInformation
ExitProcess
GetModuleHandleW
GetStartupInfoA
RaiseException
RtlPcToFileHeader
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
SetStdHandle
EnterCriticalSection
LeaveCriticalSection
RtlFillMemory
HeapReAlloc
GetCommandLineA
user32
GetDlgItem
EnableWindow
SetDlgItemTextA
GetDC
ReleaseDC
LoadIconA
MessageBoxA
SetForegroundWindow
GetSysColor
SendDlgItemMessageA
LoadStringA
GetWindowRect
GetClientRect
SetWindowPos
GetWindowTextA
SetWindowTextA
GetSystemMetrics
GetWindow
GetClassNameA
GetWindowLongA
SetWindowLongA
DialogBoxParamA
EndDialog
CheckDlgButton
IsDlgButtonChecked
GetParent
SendMessageA
InvalidateRect
gdi32
CreateFontA
DeleteObject
GetDeviceCaps
advapi32
RegSetValueExA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
SHChangeNotify
SHFileOperationA
ole32
OleUninitialize
OleInitialize
CoCreateInstance
Sections
.text Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 592KB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE