Static task
static1
Behavioral task
behavioral1
Sample
b146d7578b57ee75d37f3e57982b5633c944005863a897f2386d6a1894de013e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b146d7578b57ee75d37f3e57982b5633c944005863a897f2386d6a1894de013e.exe
Resource
win10v2004-20220812-en
General
-
Target
b146d7578b57ee75d37f3e57982b5633c944005863a897f2386d6a1894de013e
-
Size
213KB
-
MD5
80f59b700340a35244302f022c7af8e4
-
SHA1
7b2ae38a2951b49f0590fb54f88462e488baa0ce
-
SHA256
b146d7578b57ee75d37f3e57982b5633c944005863a897f2386d6a1894de013e
-
SHA512
4eebe97c2c8b1488870db7899c5f5e168d4b7323a5aa3a797162a6b2cdfedc139035170375056e967503df4dd5a886b7eeccaf443e22b6690222167cfbaa4adc
-
SSDEEP
3072:G6qDtguHiyqhYSJS7JhYEY87K/ax7BjbvHxtzH42cdOUn8BTsjwBDxOCG/:tWg4Fp7jdgSdvxtzHtGOy8BTsjWxOCG/
Malware Config
Signatures
Files
-
b146d7578b57ee75d37f3e57982b5633c944005863a897f2386d6a1894de013e.exe windows x86
ec8c48362c751a178fa0d4bab0946911
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msoeacct
ValidEmailAddress
HrCreateAccountManager
DllCanUnloadNow
DllGetClassObject
GetDllMajorVersion
kernel32
GlobalHandle
GetCurrentProcessId
InterlockedDecrement
GetThreadPriority
WaitForSingleObject
QueryPerformanceCounter
EnterCriticalSection
GetVersionExW
HeapFree
VirtualFree
InterlockedExchange
DeleteCriticalSection
GetCurrentThread
WriteFile
MultiByteToWideChar
lstrlenA
CloseHandle
SetLastError
InterlockedIncrement
GetFullPathNameW
lstrcpyA
GetProfileIntA
GetSystemTimeAsFileTime
GetFileAttributesW
FreeLibrary
GlobalFindAtomW
lstrlenW
GetTickCount
IsValidCodePage
GetLastError
CreateThread
SetEndOfFile
GlobalLock
IsBadWritePtr
IsBadReadPtr
GetSystemInfo
SetThreadPriority
WaitForMultipleObjects
lstrcmpiW
SetFilePointer
lstrcpynW
lstrcpyW
lstrcmpW
GetProcessHeap
InitializeCriticalSection
SetEvent
GlobalAlloc
GlobalFree
WideCharToMultiByte
GetQueuedCompletionStatus
GlobalMemoryStatus
GetFileSize
ReadFile
HeapAlloc
GlobalUnlock
CreateFileW
GetCurrentProcess
CreateSemaphoreW
LeaveCriticalSection
GetModuleFileNameA
LoadLibraryW
GetPrivateProfileStringW
SetUnhandledExceptionFilter
CreateEventW
GetTimeZoneInformation
ResetEvent
ReleaseSemaphore
DeleteFileW
GetDiskFreeSpaceW
MulDiv
GetEnvironmentStringsW
IsBadCodePtr
msnetobj
DllGetClassObject
DllCanUnloadNow
DllRegisterServer
DllUnregisterServer
oleaut32
VarBstrFromDec
VarBstrFromUI8
VarBstrFromDisp
VarBstrFromR4
VarBstrFromR8
VarBstrFromUI4
VarBstrFromI2
VarBstrFromI8
VarBstrFromUI1
VarBstrFromCy
VarBstrFromI4
VarBstrFromDate
VarBstrFromUI2
VarBstrFromI1
user32
GetWindowRect
LoadCursorW
CheckDlgButton
GetDesktopWindow
SetDlgItemInt
GetDlgItemInt
IsRectEmpty
SetDlgItemTextW
GetClientRect
DestroyWindow
DefWindowProcW
LoadStringW
InvalidateRect
IsWindow
CheckRadioButton
GetDC
PeekMessageW
ShowWindow
SetWindowLongW
GetAsyncKeyState
IsWindowVisible
SendMessageW
TranslateMessage
CreateDialogParamW
EnableWindow
ClientToScreen
MoveWindow
SetCursor
ReleaseDC
GetDlgItem
GetWindowLongW
DispatchMessageW
msoert2
AppendTempFileList
msls31
LssbGetVisibleDcpInSubline
LssbGetNumberDnodesInSubline
LssbGetPlsrunsFromSubline
LssbGetDurTrailWithPensInSubline
LsCompressSubline
LssbGetObjDimSubline
msltus40
DllUnregisterServer
DllRegisterServer
cewmdm
DllRegisterServer
DllGetClassObject
DllCanUnloadNow
DllUnregisterServer
nddeapi
NDdeGetShareSecurityW
NDdeIsValidAppTopicListA
NDdeGetErrorStringA
NDdeGetTrustedShareW
NDdeGetTrustedShareA
NDdeIsValidAppTopicListW
Sections
.text Size: 85KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ