Static task
static1
Behavioral task
behavioral1
Sample
66bcb08f8ccebda51023118ee52ff41c275f0ddbf3bd39836a4dcdf2045294ee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
66bcb08f8ccebda51023118ee52ff41c275f0ddbf3bd39836a4dcdf2045294ee.exe
Resource
win10v2004-20220812-en
General
-
Target
66bcb08f8ccebda51023118ee52ff41c275f0ddbf3bd39836a4dcdf2045294ee
-
Size
751KB
-
MD5
4bfb90f1b43a973098d5ff447a3484a0
-
SHA1
32fa4987667a8a54360488cf0e090a52ba7d01da
-
SHA256
66bcb08f8ccebda51023118ee52ff41c275f0ddbf3bd39836a4dcdf2045294ee
-
SHA512
39df381c7b6c37e7cd019ca18fcff014d5ccb5d990997354520cfc5374cea7cf618964a6cd387c15c7ce0d2536e074d15d22c024f183ff9b904b822d1445e9a6
-
SSDEEP
12288:b8IbAz6Onx/OENlePxF/aXRK9J1hGVwV02WMhJaXuup4jwKS58esdtI8TuU6VCwb:hbAzRrfeb/5TGVwa2WMm++46ybIqYI0D
Malware Config
Signatures
Files
-
66bcb08f8ccebda51023118ee52ff41c275f0ddbf3bd39836a4dcdf2045294ee.exe windows x86
7289f96427e6eccf29ace90a47df7ea5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetForegroundWindow
DispatchMessageA
GetDC
ReleaseDC
DestroyWindow
GetParent
ShowWindow
EnableWindow
TranslateMessage
LoadStringA
EnableMenuItem
RegisterClassA
GetSubMenu
SetTimer
SetFocus
BeginPaint
KillTimer
GetSystemMetrics
GetWindowRect
ReleaseCapture
SetWindowLongA
SetWindowTextA
GetWindowLongA
ScreenToClient
LoadCursorA
LoadIconA
GetDesktopWindow
EndDialog
MoveWindow
MessageBoxA
DialogBoxParamA
SendMessageA
GetClientRect
SetCursor
kernel32
CreateFileA
GetStdHandle
GetFileAttributesA
WaitForSingleObject
LockResource
FindFirstFileW
HeapDestroy
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
LocalAlloc
SetFilePointer
WideCharToMultiByte
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
GetStringTypeW
SetEvent
LocalFree
FormatMessageW
InitializeCriticalSection
LoadResource
FindClose
TlsGetValue
FormatMessageA
SetLastError
GetEnvironmentVariableA
FlushFileBuffers
GetModuleFileNameA
LoadLibraryExA
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
CreateEventW
GetCurrentThread
GetTickCount
GetCommandLineA
GetCurrentThreadId
GetLastError
GetVersion
GetCurrentProcessId
GetModuleHandleA
ExitProcess
VirtualAlloc
GetOEMCP
Sleep
CreateProcessW
HeapCreate
SetStdHandle
GetModuleHandleW
GetACP
CloseHandle
ReadFile
RaiseException
InterlockedCompareExchange
HeapSize
SizeofResource
VirtualQuery
GlobalUnlock
GetEnvironmentStringsW
LCMapStringA
lstrlenA
LCMapStringW
LeaveCriticalSection
TlsSetValue
GetFileType
CreateEventA
CreateFileW
GetTimeZoneInformation
GlobalLock
FindNextFileA
FindNextFileW
CompareStringW
GetProcessHeap
GetProcAddress
DeleteFileA
GetFileSize
GetStartupInfoA
LoadLibraryA
GetVersionExA
TlsAlloc
QueryPerformanceCounter
FreeLibrary
LoadLibraryW
EnterCriticalSection
HeapFree
InterlockedIncrement
SetEndOfFile
GlobalAlloc
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
SetUnhandledExceptionFilter
Sections
.text Size: 711KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ