__FineObjUsed
Static task
static1
Behavioral task
behavioral1
Sample
b13834c4b128569b2a6534f12b80e7d72b7fecf79c46cfc777edfe2dd0186d69.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b13834c4b128569b2a6534f12b80e7d72b7fecf79c46cfc777edfe2dd0186d69.exe
Resource
win10v2004-20220812-en
General
-
Target
b13834c4b128569b2a6534f12b80e7d72b7fecf79c46cfc777edfe2dd0186d69
-
Size
676KB
-
MD5
816b368013e684cc7e7ab54995c77e70
-
SHA1
3a095e2e7d02c550cd89aa0874bf994b8c76bf78
-
SHA256
b13834c4b128569b2a6534f12b80e7d72b7fecf79c46cfc777edfe2dd0186d69
-
SHA512
10356925891362161f7d0f69966f528b4675aada3bae72f73eee9859818d633eff0c383457e8a01c9292b53974862bde8e9bcafeb9883bba885ee444b0d3a3e0
-
SSDEEP
6144:zcrwN3ccbrdMuzA4zLm27bwm5paIjHXTzxZCmzaB3MKWWCAKarq5PnCEiE9kQdTa:gkNDbrdtAmw0rXnOBJl6a6n1f24MnJJ
Malware Config
Signatures
Files
-
b13834c4b128569b2a6534f12b80e7d72b7fecf79c46cfc777edfe2dd0186d69.exe windows x86
40bfe6ada0b765aa8ade4a2658503d80
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
OpenProcess
GetFileAttributesW
lstrcpynW
FreeLibrary
GetProcAddress
LoadLibraryW
GetModuleFileNameW
CreateProcessW
OpenMutexW
CreateMutexW
GetLastError
GetSystemDirectoryA
GetWindowsDirectoryA
SetEnvironmentVariableA
CompareStringA
CreateFileA
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
InterlockedExchange
InterlockedDecrement
GetTimeZoneInformation
LCMapStringA
GetStringTypeA
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
IsDebuggerPresent
TerminateProcess
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetCurrentThreadId
GetStartupInfoA
SetHandleCount
GetCommandLineW
GetCommandLineA
GetEnvironmentStrings
FreeEnvironmentStringsA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RaiseException
RtlUnwind
GetVersionExA
InterlockedIncrement
WaitForSingleObject
GetTickCount
GlobalFindAtomW
GlobalAddAtomW
GlobalDeleteAtom
HeapReAlloc
CloseHandle
DeleteCriticalSection
InitializeCriticalSection
GetModuleHandleA
EnterCriticalSection
LeaveCriticalSection
LocalFree
GetCurrentProcess
TlsGetValue
GetCurrentProcessId
VirtualQuery
LocalFileTimeToFileTime
SystemTimeToFileTime
GetLocalTime
FileTimeToSystemTime
FileTimeToLocalFileTime
TlsAlloc
TlsFree
FindClose
SetErrorMode
GetModuleFileNameA
ExitProcess
LoadLibraryA
VirtualFree
HeapCreate
HeapAlloc
GetProcessHeap
HeapFree
TlsSetValue
VirtualAlloc
HeapSize
HeapDestroy
GetFileType
ReadFile
SetFilePointer
GetStdHandle
WriteFile
GetACP
IsValidLocale
GetSystemDefaultLangID
GetOEMCP
SetLastError
GetFileSize
FlushFileBuffers
SetEndOfFile
user32
CreateWindowExW
SetWindowLongW
LoadMenuW
GetSubMenu
GetMenuDefaultItem
IsMenu
GetCursorPos
TrackPopupMenu
GetLastActivePopup
SetForegroundWindow
DestroyWindow
DestroyIcon
GetSystemMetrics
DefWindowProcW
SendMessageTimeoutW
RegisterWindowMessageW
PostQuitMessage
ModifyMenuW
CheckMenuItem
EnableMenuItem
IsWindow
RegisterClassW
SetMenuDefaultItem
MessageBoxW
SendMessageW
KillTimer
GetMessageW
DispatchMessageW
TranslateMessage
SetTimer
GetDoubleClickTime
IsWindowVisible
MessageBoxA
IsIconic
IsWindowEnabled
PostMessageW
UnregisterClassW
ShowWindow
FindWindowW
LoadImageW
DestroyMenu
GetWindowThreadProcessId
advapi32
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCreateKeyExW
DeregisterEventSource
RegisterEventSourceW
ReportEventW
shell32
Shell_NotifyIconW
SHGetSpecialFolderLocation
ole32
CoTaskMemFree
oleaut32
SysFreeString
Exports
Exports
Sections
.text Size: 232KB - Virtual size: 230KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 380KB - Virtual size: 376KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ