Static task
static1
Behavioral task
behavioral1
Sample
b12f6c23bd01ddcf6e6e704acacaa12ff97135906f487c68056b3d18a6aa6dda.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b12f6c23bd01ddcf6e6e704acacaa12ff97135906f487c68056b3d18a6aa6dda.exe
Resource
win10v2004-20220901-en
General
-
Target
b12f6c23bd01ddcf6e6e704acacaa12ff97135906f487c68056b3d18a6aa6dda
-
Size
468KB
-
MD5
067b1a9f3529a06105b1dae53d3c9758
-
SHA1
40dc61f686d20c9a6bcf5d25c0127f1a83bcb080
-
SHA256
b12f6c23bd01ddcf6e6e704acacaa12ff97135906f487c68056b3d18a6aa6dda
-
SHA512
02d3652c92926195c460d29d52d274750b778e4c3f028e7a43182c703ec85906a86070a6009195e0175827772a4f44a8a66c050afa18f9b7c282e100703023d8
-
SSDEEP
6144:O4HLKNDdD2SCW/ZXfVgL/1wEE1AaWjJJTvtGD0z8DAqwtp5jBgoVmFGwSBsXglil:O4MN2BW5VgL/CEE1u+Q/qwtpz9fGXge
Malware Config
Signatures
Files
-
b12f6c23bd01ddcf6e6e704acacaa12ff97135906f487c68056b3d18a6aa6dda.exe windows x86
89f787d2763e719d894aae5322161869
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
HeapFree
CloseHandle
UnhandledExceptionFilter
TlsSetValue
ReadFile
GetLocalTime
GetFullPathNameA
HeapCreate
HeapAlloc
GlobalUnlock
GetCurrentProcess
DeleteCriticalSection
lstrcmpW
LockResource
FreeEnvironmentStringsW
GetTempPathA
WaitForSingleObject
LocalFree
GetCPInfo
GetTickCount
VirtualProtect
GlobalAlloc
GetOEMCP
LoadLibraryW
GetStartupInfoW
ConvertDefaultLocale
InterlockedCompareExchange
HeapDestroy
TlsGetValue
IsDebuggerPresent
IsBadCodePtr
GetFileTime
WaitForMultipleObjects
GetFullPathNameW
FreeEnvironmentStringsA
GetFileSize
GetCurrentProcessId
MultiByteToWideChar
GlobalLock
RtlUnwind
GetModuleFileNameW
GetCommandLineA
VirtualFree
GetLastError
IsBadReadPtr
HeapReAlloc
CreateMutexW
SetEvent
InterlockedExchange
GetModuleFileNameA
GetStringTypeA
IsBadWritePtr
UnlockFile
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
SetHandleCount
GetLocaleInfoW
LCMapStringW
GlobalReAlloc
TerminateThread
FindClose
GetCommandLineW
SetEnvironmentVariableA
CompareStringA
LoadLibraryA
CreateThread
GetDriveTypeA
GetVersionExA
LocalFileTimeToFileTime
GetEnvironmentStringsW
InterlockedDecrement
GetProcAddress
FlushFileBuffers
GetModuleHandleW
GetThreadLocale
LockFile
EnterCriticalSection
SystemTimeToFileTime
CreateFileMappingA
TlsAlloc
CreateDirectoryA
SetLastError
DeviceIoControl
SetFileTime
SetUnhandledExceptionFilter
GetTimeZoneInformation
GetCurrentThread
InitializeCriticalSection
GetACP
GetSystemTime
QueryPerformanceCounter
TlsFree
VirtualQuery
GetModuleHandleA
LocalAlloc
HeapSize
GetDateFormatA
GetSystemInfo
GetVersion
GetCurrentThreadId
LCMapStringA
GetStringTypeW
GetEnvironmentStrings
GetStdHandle
VirtualAlloc
SetStdHandle
lstrlenA
GetFileType
CreateFileA
lstrcpynA
GlobalDeleteAtom
LoadResource
FileTimeToSystemTime
Sleep
TerminateProcess
RaiseException
GetProcessHeap
ExitProcess
CompareStringW
DuplicateHandle
MulDiv
GlobalSize
ResetEvent
LeaveCriticalSection
GetStartupInfoA
FreeLibrary
InterlockedIncrement
user32
IsRectEmpty
SetMenuDefaultItem
PostThreadMessageW
SetFocus
SetCursor
GetWindowRect
DrawStateW
CallNextHookEx
PeekMessageW
EndPaint
SetPropW
GetClientRect
GetSystemMetrics
MoveWindow
GetWindowThreadProcessId
FillRect
GetMenuItemID
CreatePopupMenu
KillTimer
DestroyWindow
EqualRect
SetTimer
AdjustWindowRectEx
IsMenu
CopyRect
PtInRect
DrawIconEx
DrawMenuBar
ShowWindow
ClientToScreen
PostMessageW
InvalidateRect
AppendMenuW
DestroyAcceleratorTable
SendDlgItemMessageA
GetFocus
UnregisterClassA
GetWindowTextW
UnregisterClassW
GetSystemMenu
RegisterClassExW
DrawFocusRect
WindowFromPoint
SetForegroundWindow
DefWindowProcW
IsIconic
DestroyIcon
GetAsyncKeyState
MessageBoxA
CallWindowProcW
FrameRect
TrackPopupMenu
UnhookWindowsHookEx
RegisterClassW
IntersectRect
RemovePropW
MapWindowPoints
GetSysColorBrush
LockWindowUpdate
MessageBeep
BeginPaint
GetUpdateRect
RedrawWindow
MapDialogRect
GetNextDlgTabItem
SetMenu
GetMenuDefaultItem
ShowScrollBar
SetClipboardData
MessageBoxW
GetDlgCtrlID
SystemParametersInfoW
GetWindowTextLengthW
SetWindowRgn
SetCapture
FindWindowW
IsZoomed
GetLastActivePopup
GetSubMenu
SetRect
GetMenuItemCount
GetDoubleClickTime
GetAncestor
LoadStringW
GetPropW
PostQuitMessage
GetSysColor
GetIconInfo
GetWindowDC
EndDialog
ReleaseDC
IsWindow
SystemParametersInfoA
CreateWindowExW
LoadAcceleratorsW
GetKeyboardLayout
InvalidateRgn
GetDC
ReuseDDElParam
CheckMenuItem
DestroyCursor
LoadImageW
ReleaseCapture
DrawFrameControl
GetWindow
IsWindowEnabled
InsertMenuItemW
GetWindowLongW
LoadIconW
GetCursorPos
InflateRect
comdlg32
GetSaveFileNameW
ChooseFontW
advapi32
RegCloseKey
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegCreateKeyExA
RegSetValueExA
RegisterServiceCtrlHandlerA
OpenThreadToken
OpenProcessToken
OpenServiceA
RegDeleteKeyA
OpenSCManagerA
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
GetLengthSid
FreeSid
DeleteService
AllocateAndInitializeSid
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 248KB - Virtual size: 247KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 68KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ