Static task
static1
Behavioral task
behavioral1
Sample
0b14f06efb7ee8bfb1d45697ca3f6c7f369d4d9331700ca7dd3ed83f077136a7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0b14f06efb7ee8bfb1d45697ca3f6c7f369d4d9331700ca7dd3ed83f077136a7.exe
Resource
win10v2004-20220812-en
General
-
Target
0b14f06efb7ee8bfb1d45697ca3f6c7f369d4d9331700ca7dd3ed83f077136a7
-
Size
214KB
-
MD5
a0ce08ad13f96bac9c3e5c19d35bdef7
-
SHA1
8277678535a4cd64212e9ae0c5ae406f18564786
-
SHA256
0b14f06efb7ee8bfb1d45697ca3f6c7f369d4d9331700ca7dd3ed83f077136a7
-
SHA512
b1e67e01b8e71bca0ef38f918633b1a137f7742b622d26706be436667c4cb4209e2202844037cdb01ffd669df01a5109a5a79db066f84d41df628b4cde385125
-
SSDEEP
6144:zcK2oYHQbAmigs1mEn2M/+sWP0XVhYvvW1:zX2ybAmiYEHa0lhYXW1
Malware Config
Signatures
Files
-
0b14f06efb7ee8bfb1d45697ca3f6c7f369d4d9331700ca7dd3ed83f077136a7.exe windows x86
f460960654b28bd1fffbc3578d473a60
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
VarBstrFromR4
VarBstrFromI4
VarBstrFromUI1
VarBstrFromI1
VarBstrFromDec
VarBstrFromUI4
VarBstrFromDate
VarBstrFromUI2
VarBstrFromCy
VarBstrFromDisp
VarBstrFromI8
VarBstrFromUI8
VarBstrFromI2
VarBstrFromR8
kernel32
GetEnvironmentStringsW
SetThreadPriority
HeapFree
InitializeCriticalSection
MultiByteToWideChar
QueryPerformanceCounter
SetUnhandledExceptionFilter
CreateEventW
GetSystemTimeAsFileTime
GetProcessHeap
lstrcpynW
GetProfileIntA
IsBadWritePtr
GlobalFree
CreateThread
IsValidCodePage
lstrcpyW
DeleteCriticalSection
WaitForMultipleObjects
WaitForSingleObject
GlobalMemoryStatus
GetSystemInfo
GetThreadPriority
CreateFileW
SetFilePointer
HeapAlloc
ReleaseSemaphore
GlobalLock
GlobalFindAtomW
ResetEvent
GlobalHandle
WriteFile
GetTimeZoneInformation
DeleteFileW
IsBadCodePtr
InterlockedIncrement
IsBadReadPtr
MulDiv
GetVersionExW
GetDiskFreeSpaceW
GetCurrentProcess
InterlockedDecrement
GetLastError
GetFileSize
GlobalUnlock
GetFileAttributesW
CreateSemaphoreW
GlobalAlloc
GetFullPathNameW
lstrlenW
SetEvent
WideCharToMultiByte
VirtualFree
GetCurrentThread
GetCurrentProcessId
LoadLibraryW
lstrcmpiW
GetPrivateProfileStringW
lstrcmpW
SetLastError
LeaveCriticalSection
FreeLibrary
GetModuleFileNameA
lstrcpyA
CloseHandle
InterlockedExchange
GetTickCount
EnterCriticalSection
ReadFile
SetEndOfFile
GetQueuedCompletionStatus
lstrlenA
msnetobj
DllUnregisterServer
DllRegisterServer
DllCanUnloadNow
DllGetClassObject
user32
GetDlgItemInt
CheckDlgButton
InvalidateRect
IsRectEmpty
GetDC
DefWindowProcW
SetDlgItemInt
SetDlgItemTextW
MoveWindow
LoadStringW
ReleaseDC
SetCursor
EnableWindow
GetClientRect
DispatchMessageW
PeekMessageW
SendMessageW
GetWindowLongW
GetDlgItem
SetWindowLongW
CreateDialogParamW
IsWindow
ClientToScreen
TranslateMessage
IsWindowVisible
GetAsyncKeyState
GetWindowRect
ShowWindow
LoadCursorW
CheckRadioButton
DestroyWindow
GetDesktopWindow
msls31
LssbGetObjDimSubline
LssbGetNumberDnodesInSubline
LsCompressSubline
LssbGetDurTrailWithPensInSubline
LssbGetVisibleDcpInSubline
LssbGetPlsrunsFromSubline
cewmdm
DllGetClassObject
DllUnregisterServer
DllCanUnloadNow
DllRegisterServer
nddeapi
NDdeGetShareSecurityW
NDdeIsValidAppTopicListW
NDdeGetTrustedShareW
NDdeIsValidAppTopicListA
NDdeGetTrustedShareA
NDdeGetErrorStringA
msoeacct
DllGetClassObject
ValidEmailAddress
DllCanUnloadNow
HrCreateAccountManager
GetDllMajorVersion
msoert2
AppendTempFileList
msltus40
DllUnregisterServer
DllRegisterServer
Sections
.text Size: 85KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ