Static task
static1
Behavioral task
behavioral1
Sample
b073fd2a007c791958dfd951a7e764a73d1c4579000988d9e3d63b6c7b6751e4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b073fd2a007c791958dfd951a7e764a73d1c4579000988d9e3d63b6c7b6751e4.exe
Resource
win10v2004-20220812-en
General
-
Target
b073fd2a007c791958dfd951a7e764a73d1c4579000988d9e3d63b6c7b6751e4
-
Size
291KB
-
MD5
9084e81c0b51b9993eee1d630291ce50
-
SHA1
1d9c6d2412cfa863b0c4bff24689d28b6216489a
-
SHA256
b073fd2a007c791958dfd951a7e764a73d1c4579000988d9e3d63b6c7b6751e4
-
SHA512
7f0b18738823f65db4770cb7c3a732e59ae6564cdb00621a3a804ef87b397722e691b67d4c8d4fe8cdfb73528d4ac488576bede556fac6545ebef197a92f487e
-
SSDEEP
3072:TlIJyx7/BGAB0SKvLHjt7YSr89eHTXsUp+iWJXbrSRvyG9w+iWJf:5IJy9IA+Rt7zx0JXbavyG9fJf
Malware Config
Signatures
Files
-
b073fd2a007c791958dfd951a7e764a73d1c4579000988d9e3d63b6c7b6751e4.exe windows x86
44abe123984f5d807b44f4e4f09b0d07
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
WindowFromPoint
WinHelpA
WaitMessage
UpdateWindow
UnregisterClassA
UnhookWindowsHookEx
TranslateMessage
TranslateMDISysAccel
TrackPopupMenu
SystemParametersInfoA
ShowWindow
ShowScrollBar
ShowOwnedPopups
ShowCursor
SetWindowsHookExA
SetWindowPos
SetWindowPlacement
SetWindowLongA
SetTimer
SetScrollRange
SetScrollPos
SetScrollInfo
SetRect
SetPropA
SetMenuItemInfoA
SetMenu
SetForegroundWindow
SetFocus
SetCursor
SetClassLongA
SetCapture
SetActiveWindow
SendMessageA
ScrollWindow
ScreenToClient
RemovePropA
RemoveMenu
ReleaseDC
ReleaseCapture
RegisterWindowMessageA
RegisterClipboardFormatA
RegisterClassA
RedrawWindow
GetMenuItemCount
GetMenu
GetLastActivePopup
GetKeyboardState
GetKeyboardLayoutList
GetKeyboardLayout
GetKeyState
GetKeyNameTextA
GetIconInfo
GetForegroundWindow
GetFocus
GetDesktopWindow
GetDCEx
GetDC
GetCursorPos
GetCursor
GetClipboardData
GetClientRect
GetClassNameA
GetClassInfoA
GetCapture
GetActiveWindow
FrameRect
FindWindowA
FillRect
EqualRect
EnumWindows
EnumThreadWindows
EndPaint
EnableWindow
EnableScrollBar
EnableMenuItem
DrawTextA
DrawMenuBar
DrawIconEx
DrawIcon
DrawFrameControl
DrawEdge
DispatchMessageA
DestroyWindow
DestroyMenu
DestroyIcon
DestroyCursor
DeleteMenu
DefWindowProcA
DefMDIChildProcA
DefFrameProcA
CreateWindowExA
CreatePopupMenu
CreateMenu
CreateIcon
ClientToScreen
CheckMenuItem
CallWindowProcA
CallNextHookEx
BeginPaint
CharLowerBuffA
CharLowerA
AdjustWindowRectEx
ActivateKeyboardLayout
GetKeyboardType
LoadStringA
MessageBoxA
CharNextA
IsWindowVisible
IsWindowUnicode
TabbedTextOutA
IsHungAppWindow
CheckRadioButton
shell32
ShellExecuteExW
SHGetDesktopFolder
ShellExecuteW
SHGetMalloc
advapi32
RegEnumValueW
QueryServiceStatus
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RevertToSelf
RegQueryValueW
AdjustTokenPrivileges
LookupPrivilegeValueW
RegEnumKeyExW
RegQueryInfoKeyW
RegEnumKeyExA
RegEnumKeyW
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
OpenThreadToken
RegDeleteKeyW
RegDeleteValueW
OpenSCManagerW
gdi32
SetTextAlign
CreateBrushIndirect
kernel32
GetTimeZoneInformation
GetCurrentThreadId
GetProcAddress
GetModuleHandleW
InterlockedDecrement
InterlockedIncrement
IsDebuggerPresent
DeleteCriticalSection
SetHandleCount
GetStartupInfoA
GetCommandLineA
LeaveCriticalSection
EnterCriticalSection
GetSystemTimeAsFileTime
GetDateFormatA
GetTimeFormatA
GetModuleHandleA
MoveFileW
DeleteFileW
GetFileSize
SetFilePointer
SetEndOfFile
WriteFile
FindNextFileA
SetEnvironmentVariableA
ReadConsoleW
WriteConsoleW
SetStdHandle
OutputDebugStringW
GetConsoleMode
GetConsoleCP
EnumSystemLocalesW
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetStringTypeW
GetCPInfo
GetOEMCP
IsValidCodePage
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsW
ReadFile
WaitForMultipleObjects
FlushFileBuffers
SetEvent
CreateDirectoryW
RemoveDirectoryW
FindClose
FindNextFileW
FindFirstFileW
FileTimeToSystemTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetCurrentThread
InitializeCriticalSection
lstrlenA
GetLastError
lstrcpynW
lstrlenW
GetFullPathNameW
GetFileAttributesW
SetLastError
WideCharToMultiByte
MultiByteToWideChar
Sleep
TerminateThread
CreateMutexW
GetCurrentProcess
GetExitCodeProcess
FindResourceW
LoadResource
SizeofResource
WritePrivateProfileStringW
GetPrivateProfileIntW
GetCurrentProcessId
GetTickCount
WaitForSingleObject
SwitchToThread
GlobalFindAtomW
GetVolumeInformationW
LockFile
UnlockFile
GetThreadLocale
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GlobalReAlloc
GlobalHandle
LocalReAlloc
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
HeapCreate
VirtualFree
InitializeCriticalSectionAndSpinCount
LCMapStringA
GetStringTypeA
GetLocaleInfoA
VirtualAlloc
WriteConsoleA
GetConsoleOutputCP
LoadLibraryA
CreateFileA
CloseHandle
CompareStringA
ResetEvent
LockResource
GlobalLock
GetOverlappedResult
EnumResourceNamesW
CreateSemaphoreW
LCMapStringW
PeekNamedPipe
LocalAlloc
HeapReAlloc
RaiseException
ExitProcess
RtlUnwind
IsProcessorFeaturePresent
GetACP
GetModuleHandleExW
HeapSize
VirtualProtect
VirtualQuery
GetStdHandle
GetProcessHeap
FormatMessageW
HeapAlloc
GlobalAlloc
GlobalUnlock
GlobalFree
MulDiv
GetFileType
GetStartupInfoW
QueryPerformanceCounter
GetEnvironmentStringsW
HeapFree
GetCommandLineW
GetFileAttributesExW
GetUserDefaultUILanguage
GetSystemDefaultUILanguage
CompareStringW
GlobalFlags
Sections
.text Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ