Static task
static1
Behavioral task
behavioral1
Sample
0b915123a0c5ca0d2a058bb2dbc900d84a55fa43701d3d99dfa7da2b43384730.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0b915123a0c5ca0d2a058bb2dbc900d84a55fa43701d3d99dfa7da2b43384730.exe
Resource
win10v2004-20220901-en
General
-
Target
0b915123a0c5ca0d2a058bb2dbc900d84a55fa43701d3d99dfa7da2b43384730
-
Size
720KB
-
MD5
152aad5449c3fb8e98a80e18310f8185
-
SHA1
278241cffed372c656ffc5eecead92efa454cbd3
-
SHA256
0b915123a0c5ca0d2a058bb2dbc900d84a55fa43701d3d99dfa7da2b43384730
-
SHA512
63507fb4225420a929833513e69148e5336c62290cb590554169f26b63476ffb4f5dc038820ec5d50d1fe305b9f3bc31cda08f2927e6b40fde0392093da3d198
-
SSDEEP
12288:rrwB+319v6at7IO+Zi5kTKD6atTm3NcOdZUXAd6veR/4VcjKO:XwBI19v6q+nKD7tTm3iO0wdFRuO
Malware Config
Signatures
Files
-
0b915123a0c5ca0d2a058bb2dbc900d84a55fa43701d3d99dfa7da2b43384730.exe windows x86
070a47b550dae2eb1c164c8f4b955474
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
GetTickCount
GetModuleHandleA
GetLastError
GetCurrentThreadId
GetCommandLineA
GetVersion
GetCurrentThread
ExitProcess
VirtualAlloc
FindResourceA
Sleep
VirtualFree
UnmapViewOfFile
IsValidCodePage
GlobalLock
GetACP
CloseHandle
ReadFile
TlsFree
RaiseException
HeapSize
GetCurrentDirectoryA
SizeofResource
lstrlenW
GlobalUnlock
GlobalFree
lstrlenA
GetSystemInfo
HeapCreate
SetStdHandle
LeaveCriticalSection
CreateFileA
GetFileType
CreateEventA
CreateFileW
GetTimeZoneInformation
ExpandEnvironmentStringsA
FindFirstFileW
CreateFileMappingA
CompareStringA
CompareStringW
GetProcAddress
SetEvent
DeleteFileA
CreateDirectoryA
GetFileSize
GetStartupInfoA
LoadLibraryA
GetVersionExA
QueryPerformanceCounter
FreeLibrary
SetHandleCount
HeapFree
InterlockedIncrement
SetEndOfFile
GlobalAlloc
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
GetSystemDirectoryA
MulDiv
SetFilePointer
MultiByteToWideChar
InterlockedDecrement
UnhandledExceptionFilter
LoadLibraryExA
GetModuleFileNameA
FlushFileBuffers
HeapAlloc
GetModuleFileNameW
SetLastError
TlsGetValue
FindClose
InitializeCriticalSection
FormatMessageW
LocalFree
GetOEMCP
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
WriteFile
InterlockedExchange
GetStringTypeA
WideCharToMultiByte
FreeEnvironmentStringsW
SetErrorMode
LocalAlloc
GetLocaleInfoA
GetCurrentProcess
DeleteCriticalSection
FreeEnvironmentStringsA
HeapDestroy
WaitForSingleObject
GetFileAttributesA
GetStdHandle
user32
SetCursor
CallWindowProcA
DrawTextA
SendMessageA
GetDesktopWindow
TrackPopupMenu
LoadCursorA
ScreenToClient
GetDlgItem
CreateWindowExA
SetWindowTextA
GetWindowRect
GetSystemMetrics
KillTimer
PeekMessageA
SetFocus
FillRect
SetTimer
LoadStringA
IsWindowEnabled
TranslateMessage
ShowWindow
UpdateWindow
ReleaseDC
GetDC
DispatchMessageA
IsWindow
SetWindowPos
PostQuitMessage
Sections
.text Size: 683KB - Virtual size: 1008KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ