Static task
static1
Behavioral task
behavioral1
Sample
b08daa4eb636aa9c9b853912831ef259d0ededdf1e9dde68683e188d56689f36.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b08daa4eb636aa9c9b853912831ef259d0ededdf1e9dde68683e188d56689f36.exe
Resource
win10v2004-20220901-en
General
-
Target
b08daa4eb636aa9c9b853912831ef259d0ededdf1e9dde68683e188d56689f36
-
Size
612KB
-
MD5
9d1448cdcdde524eb7342476cd41a579
-
SHA1
134a17a59b4af60ac696255977ce8395d22a2329
-
SHA256
b08daa4eb636aa9c9b853912831ef259d0ededdf1e9dde68683e188d56689f36
-
SHA512
b7f2a259e2a2313f6e575ca7a00565f232407c09313af53fbcd57b38062cf4fef6da693ce29623a6e4941a15bcf1c6295c84a5d909c40045836cb5437998e66c
-
SSDEEP
6144:6l4Do1ULXoZQi7GWXZoa9hiB2JHfVREC8+ldx0s:6l8YyWXRbiB2JHkxGdxF
Malware Config
Signatures
Files
-
b08daa4eb636aa9c9b853912831ef259d0ededdf1e9dde68683e188d56689f36.exe windows x86
cc0136d5c4e8e1dfb9499f0ca1ac0706
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42d
ord2341
ord2432
ord2339
ord3143
ord3144
ord3142
ord2431
ord3367
ord3786
ord3658
ord1952
ord1228
ord4492
ord2875
ord317
ord728
ord574
ord1857
ord3524
ord730
ord719
ord1401
ord3825
ord2411
ord2415
ord5058
ord1858
ord1876
ord4178
ord4420
ord1350
ord4304
ord2484
ord4387
ord3656
ord4000
ord3950
ord1797
ord3636
ord2753
ord2509
ord4749
ord3373
ord4785
ord4901
ord3785
ord3660
ord328
ord3938
ord582
ord3527
ord1232
ord1956
ord3382
ord1490
ord3758
ord3757
ord3978
ord3627
ord3972
ord4068
ord3611
ord3616
ord3836
ord3970
ord3729
ord3739
ord3738
ord3726
ord3728
ord3725
ord4004
ord4002
ord3379
ord4756
ord1365
ord4175
ord4216
ord3001
ord1343
ord4190
ord3664
ord704
ord422
ord526
ord3551
ord573
ord1316
ord4457
ord1639
ord316
ord2448
ord1284
ord2020
ord3867
ord3870
ord2409
ord1799
ord1638
ord1640
ord293
ord3889
ord1417
ord2103
ord1784
ord2412
ord4078
ord4081
ord3692
ord3575
ord2679
ord4021
ord973
ord4279
ord2717
ord2223
ord2222
ord3429
ord3361
ord4174
ord4210
ord2077
ord1309
ord3666
ord3661
ord681
ord599
ord516
ord479
ord354
ord697
ord3530
ord4183
ord1239
ord1969
ord4739
ord3685
ord558
ord492
ord294
ord298
ord559
ord556
ord684
ord593
ord1511
ord4983
ord3425
ord2995
ord1729
ord2585
ord4932
ord5080
ord1590
ord4896
ord1021
ord2435
ord880
ord4381
ord738
ord345
ord487
ord723
ord714
ord721
ord863
ord3697
ord2790
ord1098
ord4170
ord3400
ord3169
ord1861
ord305
ord485
ord5072
ord3201
ord3170
ord877
ord454
ord2436
ord1136
ord4061
ord3355
ord3086
ord813
ord2353
ord632
ord3991
ord5011
ord3068
ord3436
ord398
ord2217
ord302
ord3312
ord2324
ord734
ord901
ord2168
ord3690
ord3893
ord5082
ord5079
ord4302
ord2291
ord2640
ord299
ord1757
ord4934
ord736
ord1863
ord343
ord2799
ord3517
ord3174
ord2316
ord4405
ord3483
ord2489
ord2492
ord3338
ord3343
ord2142
ord2133
ord4589
ord4634
ord814
ord5056
ord1416
ord3731
ord3610
ord3614
ord3835
ord3969
ord4003
ord4001
ord4755
ord4209
ord1342
ord1597
ord352
ord671
ord3529
ord1238
ord1968
ord3803
ord3552
ord5077
ord3702
ord1880
ord1860
ord4415
ord3231
ord1033
ord4130
ord1789
ord2661
ord4227
ord4229
ord3366
ord3826
ord4239
ord4215
ord4408
ord3784
ord3657
ord2021
ord1285
ord2986
ord528
ord706
ord567
ord4228
ord4143
ord308
ord996
ord468
ord2052
ord711
ord2104
ord3432
ord1087
ord4676
ord1212
ord3447
ord3070
ord4053
ord3960
ord646
ord1906
ord4475
ord2993
ord413
ord3365
ord3573
ord4550
ord862
ord3421
ord1041
ord1190
ord2473
ord3691
ord2584
ord2481
ord2340
ord4205
ord1631
ord1830
ord4191
ord1344
ord4064
ord3002
ord5078
ord1566
ord2076
ord3670
ord3944
ord3069
ord1310
ord2078
ord4208
ord3618
ord5076
ord4118
ord1781
ord4176
ord3651
ord1364
ord3362
ord4753
ord1862
ord3831
ord4017
ord3948
ord3629
ord4951
ord4195
ord1100
msvcrtd
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_chkesp
_except_handler3
wcslen
wcscpy
_mbsrchr
memcpy
exit
??1type_info@@UAE@XZ
_setmbcp
_CxxThrowException
_controlfp
__CxxFrameHandler
_XcptFilter
_exit
_onexit
__dllonexit
atoi
_itoa
strcpy
sprintf
strlen
strcat
_access
kernel32
GetFileSize
CreateFileA
lstrcpyA
DeleteFileA
GlobalAlloc
MultiByteToWideChar
GetModuleHandleA
GetStartupInfoA
GlobalLock
FreeLibrary
GetProcAddress
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
InterlockedDecrement
GlobalFree
CloseHandle
GetCurrentDirectoryA
ReadFile
lstrlenW
GetLastError
lstrlenA
WideCharToMultiByte
LocalFree
GlobalUnlock
user32
GetWindowDC
GetSystemMetrics
SetWindowLongA
GetDC
GetWindowPlacement
GetWindow
GetCursorPos
SetWindowPos
ReleaseDC
GetWindowRect
SendMessageA
GetWindowLongA
gdi32
CreateCompatibleBitmap
SelectObject
DeleteObject
DeleteDC
CreateCompatibleDC
advapi32
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegSetValueExA
shell32
ShellExecuteA
SHGetSpecialFolderLocation
SHBrowseForFolderA
SHGetPathFromIDListA
mfco42d
ord798
ole32
CreateStreamOnHGlobal
OleRun
CoCreateInstance
CoUninitialize
CoInitialize
olepro32
ord251
oleaut32
SysStringLen
SysFreeString
VariantCopy
SysAllocStringByteLen
VariantChangeType
CreateErrorInfo
SetErrorInfo
GetErrorInfo
VariantClear
SysAllocString
VariantInit
gdiplus
GdipSetPenEndCap
GdipSetPenStartCap
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetSmoothingMode
GdipDrawLineI
GdipDrawString
GdipDeletePen
GdipCreateFont
GdipCreateFontFamilyFromName
GdipDeleteFontFamily
GdipDeleteFont
GdipLoadImageFromFile
GdipLoadImageFromFileICM
GdipDisposeImage
GdipCloneImage
GdipReleaseDC
GdipDrawImageRectI
GdiplusStartup
GdiplusShutdown
GdipCreatePen2
GdipAlloc
GdipFree
GdipCloneBrush
GdipDeleteBrush
GdipCreateSolidFill
GdipDrawImageI
GdipSetPenLineJoin
Sections
.text Size: 160KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 408KB - Virtual size: 406KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ