Static task
static1
Behavioral task
behavioral1
Sample
b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a.exe
Resource
win10v2004-20220812-en
General
-
Target
b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a
-
Size
744KB
-
MD5
7f3cc059ffc6c11fe42695e5f19553ab
-
SHA1
f22555d2898e3486b2c628a2e523657f5fbbe475
-
SHA256
b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a
-
SHA512
441654be8d2f49ae98d60c9a71f903d5bc861fa3c61806f78c93ed04cce1c9e1efa75961813c11119b1e1db8b181aa237e4ae0cb24fa8a9f1a7d2590229c98fc
-
SSDEEP
12288:qq/OIg++nlSl1ljxOzAqzmkZh9Twx2p9SoBUkAKL9Aus+8:qq/OIYlSl/jTqzmMhwW9KgL+
Malware Config
Signatures
Files
-
b4c05e0e065058ae79d3ce9d51a470946aae036d2b163f85adcef10a6343246a.exe windows x86
f63b0447c0dc7a12adda006f419c2873
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
RaiseException
RtlUnwind
HeapReAlloc
HeapSize
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
VirtualAlloc
Sleep
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
GetCurrentProcess
FlushFileBuffers
SetFilePointer
WriteFile
InterlockedExchange
GetModuleHandleA
GlobalFlags
GetThreadLocale
GlobalAddAtomW
GlobalFindAtomW
GlobalDeleteAtom
LoadLibraryW
LoadLibraryA
lstrcmpW
GetVersionExA
InterlockedIncrement
MultiByteToWideChar
GetCurrentThreadId
CloseHandle
FormatMessageW
FreeLibrary
InterlockedDecrement
GetModuleHandleW
GetProcAddress
TlsFree
GlobalFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalAlloc
GlobalHandle
GlobalUnlock
GlobalReAlloc
GlobalLock
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalFree
LocalAlloc
lstrlenW
WideCharToMultiByte
GetCurrentProcessId
GetModuleFileNameW
FindResourceW
LoadResource
LockResource
SizeofResource
GetLastError
SetLastError
PrepareTape
GetVersion
FileTimeToLocalFileTime
VirtualProtect
GetDriveTypeW
GetStartupInfoA
CreateEventW
user32
GetWindowTextW
GetForegroundWindow
GetDlgItem
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
AdjustWindowRectEx
WinHelpW
CopyRect
LoadIconW
RegisterWindowMessageW
PtInRect
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
SetWindowLongW
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
SetMenuItemBitmaps
IsWindow
RemovePropW
GetPropW
SetPropW
GetClassNameW
GetClassLongW
GetCapture
RegisterClassW
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
ModifyMenuW
EnableMenuItem
CheckMenuItem
LoadCursorW
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
SetWindowsHookExW
CallNextHookEx
DispatchMessageW
SetWindowTextW
ClientToScreen
DestroyMenu
TabbedTextOutW
DrawTextW
DrawTextExW
GrayStringW
PostQuitMessage
GetKeyState
PeekMessageW
ValidateRect
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
UnhookWindowsHookEx
GetWindowThreadProcessId
SendMessageW
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxW
GetTopWindow
UnregisterClassA
gdi32
DeleteDC
GetStockObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SelectObject
Escape
PtVisible
SetViewportOrgEx
SetMapMode
RestoreDC
SaveDC
ExtTextOutW
DeleteObject
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
TextOutW
RectVisible
winspool.drv
OpenPrinterW
DocumentPropertiesW
ClosePrinter
oleaut32
VariantInit
VariantChangeType
VariantClear
gdiplus
GdipAlloc
GdipFree
GdipCloneImage
GdipGetImageWidth
GdipDisposeImage
GdipLoadImageFromFile
odbc32
ord136
ord5
ord20
ord37
ord64
ord63
ord121
ord43
ord29
ord12
ord141
ord111
ord61
ord117
ord13
ord74
ord133
ord160
ord134
ord78
ord138
ord75
ord162
ord176
ord135
ord142
ord18
ord107
ord4
ord26
ord16
ord139
ord140
ord72
ord173
ord132
ord31
ord119
ord170
ord24
ord127
ord44
ord28
usp10
ScriptString_pSize
ScriptStringGetOrder
ScriptString_pcOutChars
ScriptRecordDigitSubstitution
ScriptItemize
ScriptStringFree
ScriptApplyLogicalWidth
ScriptIsComplex
ScriptJustify
ScriptStringAnalyse
ScriptLayout
ScriptCPtoX
ScriptShape
ScriptXtoCP
ScriptCacheGetHeight
ScriptGetProperties
ScriptPlace
ScriptStringOut
ScriptBreak
ScriptTextOut
ScriptGetGlyphABCWidth
ScriptGetLogicalWidths
ScriptStringCPtoX
ScriptStringGetLogicalWidths
oleacc
CreateStdAccessibleObject
LresultFromObject
Sections
.text Size: 335KB - Virtual size: 334KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 286KB - Virtual size: 286KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ