Static task
static1
Behavioral task
behavioral1
Sample
b516b710d3af3c79937e1882537972a8b9bcf16c484a6ce9f9a619e8f2df0b52.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b516b710d3af3c79937e1882537972a8b9bcf16c484a6ce9f9a619e8f2df0b52.exe
Resource
win10v2004-20220812-en
General
-
Target
b516b710d3af3c79937e1882537972a8b9bcf16c484a6ce9f9a619e8f2df0b52
-
Size
1.0MB
-
MD5
85df4f4dafa14d4ef4ecd1eecc6f8b44
-
SHA1
0c435b9235e23efd05c74daa133f18636765106a
-
SHA256
b516b710d3af3c79937e1882537972a8b9bcf16c484a6ce9f9a619e8f2df0b52
-
SHA512
73b52dbea0d0ce1fa987c0685298352b1af99fc25a7eb14f4019883504c452c4ed4d35f9f634c01ff74b60cee7ea78102dbb31fd1964bb0e88e4ab19091661ae
-
SSDEEP
12288:jcF/x/C0RtsMtz5joz2tsxPRZQQ2MAJo7TDbTD/t/QYjlnrkqvtyoyMiw4QU0Fqo:QxxzRtsm9tsxPjIJszTDKYpAazkJ+8c1
Malware Config
Signatures
Files
-
b516b710d3af3c79937e1882537972a8b9bcf16c484a6ce9f9a619e8f2df0b52.exe windows x86
745693b36b36116ee77bb55e91e3e5cd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateJobObjectW
GetCurrencyFormatA
SetStdHandle
CreateHardLinkW
GetProcAddress
DeleteTimerQueue
GetModuleHandleW
SetLocaleInfoA
GetVolumePathNameW
FlushInstructionCache
EnumCalendarInfoExA
FreeEnvironmentStringsW
AddAtomA
GetNumberOfConsoleInputEvents
GetUserDefaultLangID
DefineDosDeviceA
GetACP
ProcessIdToSessionId
SetInformationJobObject
GetPrivateProfileSectionNamesW
CreateWaitableTimerW
LocalReAlloc
FindAtomA
IsBadCodePtr
GetProcessVersion
AssignProcessToJobObject
SystemTimeToFileTime
OpenProcess
DeleteVolumeMountPointA
SetThreadIdealProcessor
ReleaseMutex
GetProfileStringW
ExpandEnvironmentStringsW
GetFileInformationByHandle
GlobalMemoryStatus
OpenEventA
AreFileApisANSI
GlobalLock
CopyFileW
GlobalUnlock
CancelIo
GetPrivateProfileSectionW
GetProfileStringA
IsBadWritePtr
GetNamedPipeHandleStateW
RemoveDirectoryW
SetFileAttributesA
GetCommandLineW
lstrcpynA
SetHandleInformation
RtlUnwind
GetPrivateProfileStructA
GetTempPathW
GetConsoleAliasExesLengthA
EnumCalendarInfoW
SetNamedPipeHandleState
GetFullPathNameA
CreateMailslotW
GetSystemTime
FindFirstFileA
Module32FirstW
DeviceIoControl
GetSystemDefaultLangID
GetCurrentThread
ExitThread
CreateWaitableTimerA
Module32NextW
SetThreadPriority
CreateTimerQueue
QueryInformationJobObject
QueryDosDeviceW
RegisterWaitForSingleObject
BindIoCompletionCallback
GetWindowsDirectoryW
CompareStringA
GetCommandLineA
GetLongPathNameA
ChangeTimerQueueTimer
FindAtomW
GetNamedPipeInfo
FoldStringW
SetMailslotInfo
LCMapStringW
CreateEventA
ReplaceFileA
GetModuleFileNameA
GetPrivateProfileStringA
SetCalendarInfoW
GetSystemDirectoryA
IsValidCodePage
PeekNamedPipe
GetProfileSectionW
SetComputerNameExA
MapUserPhysicalPages
MapViewOfFileEx
SetProcessWorkingSetSize
SetWaitableTimer
FindVolumeClose
GetDiskFreeSpaceW
GetVolumeInformationW
FindFirstVolumeA
GetBinaryTypeW
TlsSetValue
SetLocaleInfoW
GetFileAttributesW
FreeResource
FindFirstFileExA
CreateEventW
PostQueuedCompletionStatus
CreateIoCompletionPort
DnsHostnameToComputerNameW
GetShortPathNameA
CreateDirectoryW
GetStringTypeA
GetLocaleInfoW
DeleteAtom
IsDBCSLeadByte
GetConsoleAliasExesW
GetModuleHandleA
FindNextChangeNotification
SetEnvironmentVariableW
CreateNamedPipeA
FlushFileBuffers
CreateSemaphoreA
CancelWaitableTimer
GetConsoleCP
Module32Next
ContinueDebugEvent
GetLogicalDrives
SwitchToThread
SetConsoleOutputCP
FindResourceExA
GetFileAttributesA
GetPrivateProfileIntW
GetDriveTypeA
CreateFileW
DeleteTimerQueueEx
lstrcpyW
GetEnvironmentVariableA
GetFullPathNameW
QueryPerformanceFrequency
ReleaseSemaphore
GetConsoleOutputCP
LoadResource
GetCompressedFileSizeA
GetVersion
GetEnvironmentVariableW
DnsHostnameToComputerNameA
ReadFile
GetStringTypeW
GlobalReAlloc
GetMailslotInfo
GetThreadLocale
GetUserDefaultUILanguage
FreeEnvironmentStringsA
GetSystemWindowsDirectoryA
OpenEventW
GetBinaryTypeA
GetPrivateProfileSectionA
VerifyVersionInfoW
GetPrivateProfileStructW
GetPriorityClass
GetNumberFormatW
HeapSetInformation
OpenFileMappingA
OpenThread
OpenWaitableTimerA
EnumCalendarInfoExW
SetConsoleActiveScreenBuffer
SetConsoleMode
SetPriorityClass
GetCompressedFileSizeW
SetCurrentDirectoryW
WideCharToMultiByte
CreateJobObjectA
GetDateFormatW
MapUserPhysicalPagesScatter
IsDBCSLeadByteEx
GetCPInfoExA
SetThreadLocale
GetLogicalDriveStringsA
MultiByteToWideChar
HeapReAlloc
GetDiskFreeSpaceExA
GetConsoleScreenBufferInfo
GetStringTypeExW
OpenFileMappingW
GetUserDefaultLCID
SetTapePosition
CopyFileExW
GetWindowsDirectoryA
GetProcessTimes
GetConsoleAliasA
GetTempPathA
CopyFileA
VirtualAlloc
FindResourceW
GetFileSize
GetProcessPriorityBoost
GetProfileSectionA
GetCurrentDirectoryA
GetProcessIoCounters
MoveFileWithProgressW
GetCurrentConsoleFont
FoldStringA
PrepareTape
SetConsoleCtrlHandler
HeapAlloc
HeapSize
GetOEMCP
GetCPInfo
Sleep
HeapFree
GetCurrentProcess
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
LoadLibraryW
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapCreate
InterlockedDecrement
GetLastError
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsGetValue
TlsAlloc
EncodePointer
DeleteCriticalSection
SetUnhandledExceptionFilter
ExitProcess
DecodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
IsProcessorFeaturePresent
user32
RedrawWindow
advapi32
CryptHashData
RegEnumValueW
RegOpenKeyExW
ReportEventW
GetSidSubAuthorityCount
ImpersonateLoggedOnUser
OpenSCManagerA
CryptGenRandom
RegOpenKeyExA
GetLengthSid
ControlService
CryptCreateHash
RegQueryValueExA
RegFlushKey
SetServiceStatus
RegEnumKeyW
GetSecurityDescriptorOwner
DuplicateTokenEx
RegOpenKeyW
OpenSCManagerW
CryptGetHashParam
GetUserNameW
CheckTokenMembership
shell32
SHChangeNotify
SHGetFolderPathW
ShellExecuteW
SHBrowseForFolderW
SHGetDesktopFolder
CommandLineToArgvW
SHGetFileInfoW
SHBindToParent
SHGetSpecialFolderLocation
SHGetSpecialFolderPathW
SHGetMalloc
ShellExecuteExW
SHFileOperationW
oleaut32
VariantChangeTypeEx
SafeArrayGetLBound
VariantInit
SafeArrayGetUBound
SysReAllocStringLen
SafeArrayCreate
VariantCopyInd
VariantCopy
GetActiveObject
VariantChangeType
VariantClear
SafeArrayPtrOfIndex
SysStringLen
SysAllocStringByteLen
GetErrorInfo
SysFreeString
SysAllocStringLen
Sections
.text Size: 945KB - Virtual size: 945KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 56KB - Virtual size: 409KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 317B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ