Static task
static1
Behavioral task
behavioral1
Sample
1b5bd653fe07b92733039ad05fc7881721afae7d5a1c8b0ea0f60aba5ad8b63a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1b5bd653fe07b92733039ad05fc7881721afae7d5a1c8b0ea0f60aba5ad8b63a.exe
Resource
win10v2004-20220812-en
General
-
Target
1b5bd653fe07b92733039ad05fc7881721afae7d5a1c8b0ea0f60aba5ad8b63a.exe
-
Size
1.6MB
-
MD5
b8cf4a5ff200247790e9935be64b855d
-
SHA1
4a37ea0df74d42817b86f4e619a070162b5c7ba9
-
SHA256
1b5bd653fe07b92733039ad05fc7881721afae7d5a1c8b0ea0f60aba5ad8b63a
-
SHA512
10154fd01a3bafdbde3b8e93a787300514f40541ae01c348a8529a3177d7721f58f24ec53845ea6b31a7917afd49f4cf8d36e86ddd2def46375de4cef1691259
-
SSDEEP
12288:kQo5kCbg6bZYWXiiGuuhKq3wHW+fmM8HrqTOuPj/hreTZwoBwV0VBR9nfrKd5CyM:egUZ5LW+fmM8LmjsNwoBBV3FGd8y
Malware Config
Signatures
Files
-
1b5bd653fe07b92733039ad05fc7881721afae7d5a1c8b0ea0f60aba5ad8b63a.exe.exe windows x86
a56224f8f13d3523c379cb4cbae0c709
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InitializeCriticalSectionEx
DeleteCriticalSection
Sleep
WaitForMultipleObjects
CreateThread
GetCurrentThreadId
GetExitCodeThread
GetTickCount
VirtualAlloc
VirtualProtect
MultiByteToWideChar
WideCharToMultiByte
GetSystemDefaultLCID
FreeConsole
CreateIoCompletionPort
GetConsoleMode
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetDateFormatW
GetDriveTypeW
GetEnvironmentStringsW
GetExitCodeProcess
GetThreadId
GetThreadLocale
GetThreadPriority
GetTimeFormatW
GetTimeZoneInformation
GetUserDefaultLCID
GetUserDefaultLangID
IsWow64Process
K32GetPerformanceInfo
K32GetProcessMemoryInfo
K32QueryWorkingSetEx
LCMapStringW
LeaveCriticalSection
LoadLibraryExA
LoadLibraryExW
HeapAlloc
SetEnvironmentVariableW
SetEvent
SetFileAttributesW
SleepEx
SuspendThread
SwitchToThread
SystemTimeToTzSpecificLocalTime
TlsSetValue
TransactNamedPipe
TryAcquireSRWLockExclusive
UnhandledExceptionFilter
GetCommandLineA
EnterCriticalSection
WaitForSingleObject
CreateEventA
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetProcAddress
ReadConsoleW
ReadFile
SetFilePointerEx
GetFileSizeEx
GetConsoleCP
FlushFileBuffers
GetStringTypeW
SetStdHandle
HeapQueryInformation
FreeEnvironmentStringsW
GetCommandLineW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
EnumSystemLocalesW
IsValidLocale
GetLocaleInfoW
CompareStringW
SetConsoleCtrlHandler
CreateFileW
WriteConsoleW
HeapDestroy
SetLastError
GetLastError
RaiseException
CloseHandle
SetEndOfFile
DecodePointer
GetFileType
WriteFile
GetStdHandle
HeapValidate
ExitProcess
VirtualQuery
GetSystemInfo
GetModuleHandleExW
GetModuleFileNameW
FreeLibrary
TlsFree
TlsGetValue
TlsAlloc
InterlockedFlushSList
RtlUnwind
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
TerminateProcess
SetUnhandledExceptionFilter
CreateEventW
WaitForSingleObjectEx
ResetEvent
InitializeCriticalSectionAndSpinCount
OutputDebugStringW
IsDebuggerPresent
EncodePointer
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
FlushInstructionCache
IsProcessorFeaturePresent
VirtualFree
user32
UnregisterClassA
IsWindow
SetWindowPos
EndDialog
GetClientRect
GetWindowRect
MessageBoxA
MapWindowPoints
DispatchMessageA
GetWindowLongA
SetWindowLongA
GetParent
CharNextW
CharNextA
CharUpperA
DialogBoxParamA
PostThreadMessageA
GetActiveWindow
TranslateMessage
GetMessageA
GetMonitorInfoA
MonitorFromWindow
GetWindow
advapi32
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
ConvertSidToStringSidW
AccessCheck
RegQueryInfoKeyA
shell32
SHGetFolderPathW
SHGetKnownFolderPath
ole32
CoReleaseServerProcess
CoAddRefServerProcess
CoCreateInstance
StringFromGUID2
CoTaskMemRealloc
CoTaskMemFree
CoUninitialize
CoInitializeEx
CoRegisterClassObject
CoRevokeClassObject
CoResumeClassObjects
oleaut32
UnRegisterTypeLi
RegisterTypeLi
LoadTypeLi
SysStringLen
SysAllocString
GetErrorInfo
VariantClear
VariantInit
SafeArrayDestroy
SysFreeString
Sections
.text Size: 725KB - Virtual size: 725KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 176KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 709KB - Virtual size: 725KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 1024B - Virtual size: 777B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 270B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ