Static task
static1
Behavioral task
behavioral1
Sample
b974c8dbf7d6ace33309dc3a8e3a4374c0ed9fff6482369ad4a3451d3be048d2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b974c8dbf7d6ace33309dc3a8e3a4374c0ed9fff6482369ad4a3451d3be048d2.exe
Resource
win10v2004-20220812-en
General
-
Target
b974c8dbf7d6ace33309dc3a8e3a4374c0ed9fff6482369ad4a3451d3be048d2
-
Size
195KB
-
MD5
52d20eefe4779b76a74e9fbf0f9eef1f
-
SHA1
7fcdf1fd3bbb928dc3e4a688bc6d79e57d732093
-
SHA256
b974c8dbf7d6ace33309dc3a8e3a4374c0ed9fff6482369ad4a3451d3be048d2
-
SHA512
edff666e2006f33e2248d6fc0a85e8bd29110a1d378b99327e207ceca5f10321ddfdc3a856d10165865512aa1b5e9d8051c46fc1c2bb0ca7b9f264a889e91bdb
-
SSDEEP
3072:d+02PJIG/wreJXUts5uFptcCpCQJdRxivyLp0eTrzkIeXW83oRZftvzpSbKi2CrA:ddUJI4EiUvtvCoHx4aFSHgkbKiJQEs
Malware Config
Signatures
Files
-
b974c8dbf7d6ace33309dc3a8e3a4374c0ed9fff6482369ad4a3451d3be048d2.exe windows x86
888f7c3cb1911069f97ed9c2bd4061db
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumResourceNamesA
LocalFree
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetPriorityClass
GetCurrentProcess
ResumeThread
CreateEventA
SetEvent
GetExitCodeThread
GetStartupInfoA
ExitProcess
GetCommandLineA
InitializeCriticalSection
DeleteCriticalSection
DebugBreak
lstrcmpiA
GetProcessHeap
HeapReAlloc
HeapFree
CreateThread
LeaveCriticalSection
EnterCriticalSection
GetVersionExA
WaitForMultipleObjects
GetFileAttributesA
GetDriveTypeA
ReadFile
GetFileSize
CallNamedPipeA
GetUserDefaultLangID
lstrlenW
FileTimeToSystemTime
SetFilePointer
GetTempPathA
GetTempFileNameA
FindResourceA
SizeofResource
LoadResource
LockResource
GetLastError
GetCurrentThreadId
GetCurrentProcessId
OutputDebugStringA
SetFileAttributesA
GetModuleHandleA
SetLastError
GetWindowsDirectoryA
GetShortPathNameA
CreateFileA
WriteFile
CloseHandle
MoveFileA
lstrcpyA
GetTickCount
CopyFileA
DeleteFileA
GetModuleFileNameA
lstrcpynA
LoadLibraryA
GetProcAddress
WideCharToMultiByte
FreeLibrary
lstrlenA
HeapAlloc
lstrcatA
user32
CharNextA
GetKeyboardType
PeekMessageA
MsgWaitForMultipleObjects
SetCursor
SetWindowLongA
SetTimer
EndDialog
GetSystemMetrics
BeginDeferWindowPos
GetWindowTextA
SetWindowTextA
DeferWindowPos
EndDeferWindowPos
LoadStringA
GetClientRect
ScreenToClient
PostMessageA
GetDC
ReleaseDC
ShowWindow
GetDlgItem
EnableWindow
SetForegroundWindow
SendMessageA
SendDlgItemMessageA
GetWindowRect
MapWindowPoints
SetWindowPos
wvsprintfA
MessageBoxA
PostQuitMessage
DefWindowProcA
RegisterClassExA
CreateWindowExA
GetMessageA
RedrawWindow
KillTimer
InvalidateRect
UpdateWindow
GetDlgItemTextA
LoadCursorA
TranslateMessage
DispatchMessageA
wsprintfA
LoadImageA
gdi32
UpdateColors
SetTextColor
SetBkMode
GetDeviceCaps
SelectPalette
CreateHalftonePalette
GetStockObject
CreateFontIndirectA
GetTextExtentPoint32A
CreateCompatibleDC
GetObjectA
DeleteObject
RealizePalette
BitBlt
DeleteDC
SelectObject
advapi32
RegQueryValueExA
OpenSCManagerA
OpenServiceA
QueryServiceStatus
CloseServiceHandle
RegEnumKeyExA
RegDeleteKeyA
RegQueryInfoKeyA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegFlushKey
RegOpenKeyExA
RegCloseKey
shell32
ShellExecuteA
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
StrRChrA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
CoTaskMemFree
oleaut32
VariantInit
SysAllocString
VariantClear
wininet
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5.5MB - Virtual size: 5.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ