Static task
static1
Behavioral task
behavioral1
Sample
b5c1706ae7833d1f5ce58d709531ddba8e5d981401947858f4a72b4f971c6188.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b5c1706ae7833d1f5ce58d709531ddba8e5d981401947858f4a72b4f971c6188.exe
Resource
win10v2004-20220812-en
General
-
Target
b5c1706ae7833d1f5ce58d709531ddba8e5d981401947858f4a72b4f971c6188
-
Size
627KB
-
MD5
de9c1cc48b2c9bb3f2c70174613f079e
-
SHA1
8552af9db0b60a0e4cb223d5ceb40862fd07e2c7
-
SHA256
b5c1706ae7833d1f5ce58d709531ddba8e5d981401947858f4a72b4f971c6188
-
SHA512
3c0e1ba85c00ba935a6da6945ac78d36b894fb324aa2e51fe00b9d9427699cf73efb0ef7e78fd8c0e783fe160aa992c665efbb0a9841a7c7d00c7d95bd597c42
-
SSDEEP
12288:OigExcC/Z/54+d1x5Z9vkuA0leIIhFTxNQQQQQQl:OigEiaj4U1nZ9c44
Malware Config
Signatures
Files
-
b5c1706ae7833d1f5ce58d709531ddba8e5d981401947858f4a72b4f971c6188.exe windows x86
d5771fe0d1369d420e0d861977aaa911
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetUnhandledExceptionFilter
GetCurrentProcessId
QueryPerformanceCounter
GetModuleHandleA
SetEnvironmentVariableA
SearchPathA
GetLocalTime
GetFileInformationByHandle
GetFileType
GetEnvironmentVariableA
GetUserDefaultLangID
MultiByteToWideChar
CompareFileTime
GlobalAlloc
GlobalLock
GlobalUnlock
GetStartupInfoA
FindResourceA
LoadResource
LockResource
SizeofResource
GetWindowsDirectoryA
GetTempPathA
SetFileAttributesA
FileTimeToSystemTime
GetDateFormatA
GetTimeFormatA
GetFileSize
CreateFileMappingA
MapViewOfFile
GetShortPathNameA
FormatMessageA
LocalFree
ExitProcess
GetComputerNameA
GetSystemInfo
GlobalMemoryStatus
GetTimeZoneInformation
GetSystemTimeAsFileTime
FileTimeToLocalFileTime
GetSystemDefaultLangID
GetVersionExA
GetCurrentProcess
UnmapViewOfFile
WriteProcessMemory
FlushInstructionCache
ReadProcessMemory
VirtualQueryEx
VirtualProtectEx
WriteFile
ReadFile
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
GetLogicalDrives
GetDriveTypeA
SetFilePointer
ExpandEnvironmentStringsA
GetSystemDirectoryA
GetFileAttributesA
GetFullPathNameA
CreateFileA
FreeLibrary
GetCommandLineA
GetLocaleInfoA
CreateEventA
WaitForSingleObject
CreateProcessA
SetEvent
WaitForDebugEvent
ContinueDebugEvent
DeleteCriticalSection
GetCurrentThreadId
TerminateThread
TerminateProcess
GetModuleFileNameA
CloseHandle
GetThreadContext
LoadLibraryW
LoadLibraryExA
LoadLibraryExW
InterlockedExchange
LCMapStringW
LCMapStringA
VirtualQuery
VirtualAlloc
VirtualProtect
Sleep
VirtualFree
HeapCreate
HeapDestroy
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
GetACP
HeapSize
HeapReAlloc
CreateThread
ExitThread
RtlUnwind
GetProcessHeap
HeapAlloc
HeapFree
GetProfileStringA
SetErrorMode
SystemTimeToFileTime
LocalFileTimeToFileTime
GetThreadLocale
GetStringTypeExA
GetVolumeInformationA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
DuplicateHandle
GetCurrentDirectoryA
GetOEMCP
GetCPInfo
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
IsBadWritePtr
GlobalHandle
TlsAlloc
LocalAlloc
GlobalFlags
GetProcessVersion
GetDiskFreeSpaceA
GetFileTime
SetFileTime
GetTempFileNameA
GlobalFree
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
lstrcmpA
GetCurrentThread
SuspendThread
SetThreadPriority
MulDiv
lstrcmpiA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcpynA
GlobalGetAtomNameA
GlobalAddAtomA
GetVersion
lstrcpyA
lstrlenA
ResumeThread
LoadLibraryA
GetProcAddress
SetThreadContext
GetLastError
SetLastError
RaiseException
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetTickCount
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegQueryValueExA
GetUserNameA
RegEnumKeyExA
RegEnumValueA
RegCreateKeyA
GetFileSecurityA
SetFileSecurityA
RegDeleteValueA
RegSetValueExA
RegCreateKeyExA
RegSetValueA
gdi32
GetTextMetricsA
CreateRectRgnIndirect
PatBlt
Escape
TextOutA
RectVisible
PtVisible
CreatePatternBrush
CreateSolidBrush
GetDeviceCaps
CreateRectRgn
StretchDIBits
IntersectClipRect
ExcludeClipRect
SelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetBkMode
RestoreDC
SaveDC
DeleteDC
CreateBitmap
GetClipBox
GetTextAlign
GetTextExtentPoint32A
SetTextAlign
SetBkColor
SetTextColor
ExtTextOutA
CreateCompatibleDC
CreateCompatibleBitmap
CreateFontA
SetRectRgn
CombineRgn
BitBlt
CreateDIBitmap
GetStockObject
GetTextExtentPointA
SelectObject
DeleteObject
GetCharWidthA
CreateFontIndirectA
GetObjectA
LineTo
MoveToEx
user32
GetDlgItemTextA
SetDlgItemTextA
IsDlgButtonChecked
IsDialogMessageA
MoveWindow
GetNextDlgTabItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
InflateRect
SetCapture
SetCursorPos
DestroyCursor
LoadCursorA
GetCursorPos
ValidateRect
TranslateMessage
GetMessageA
PostQuitMessage
CreateDialogIndirectParamA
EndDialog
ShowOwnedPopups
WaitMessage
GetWindowThreadProcessId
WindowFromPoint
SetParent
IsRectEmpty
AppendMenuA
DeleteMenu
GetSystemMenu
CheckDlgButton
GetClassNameA
LoadStringA
FindWindowA
FillRect
InsertMenuA
GetMenuStringA
DestroyIcon
SetRect
CharUpperA
InvertRect
GetDCEx
LockWindowUpdate
IsWindowUnicode
CharNextA
DefDlgProcA
ExcludeUpdateRgn
ShowCaret
HideCaret
GetScrollPos
SetScrollPos
GetTopWindow
IsChild
RegisterClassA
TrackPopupMenu
DefWindowProcA
DestroyWindow
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetForegroundWindow
SetForegroundWindow
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetLastActivePopup
SendDlgItemMessageA
MapWindowPoints
DispatchMessageA
DeferWindowPos
BeginDeferWindowPos
EndDeferWindowPos
GetSysColorBrush
IsWindowVisible
EqualRect
GetKeyState
GetDlgCtrlID
UnpackDDElParam
ReuseDDElParam
SetMenu
LoadIconA
GetClassInfoA
DestroyMenu
ShowWindow
GetWindow
SetCursor
PeekMessageA
GetCapture
ReleaseCapture
LoadAcceleratorsA
SetRectEmpty
GetActiveWindow
wsprintfA
GetMenuItemID
AdjustWindowRectEx
RedrawWindow
SetWindowPos
GetWindowLongA
SetWindowLongA
DefMDIChildProcA
DrawMenuBar
TranslateAcceleratorA
TranslateMDISysAccel
DefFrameProcA
BringWindowToTop
GetMenu
GetMenuItemCount
RegisterWindowMessageA
SetActiveWindow
ClientToScreen
OffsetRect
PtInRect
GetDesktopWindow
EmptyClipboard
SetClipboardData
CloseClipboard
GetMessagePos
OpenClipboard
IsIconic
LoadMenuA
GetSubMenu
GetMessageTime
GetSysColor
DrawFocusRect
CopyRect
GetDC
ReleaseDC
MessageBeep
GetParent
GetClientRect
GetSystemMetrics
KillTimer
SetTimer
InvalidateRect
ScreenToClient
GetWindowRect
IsZoomed
RemoveMenu
EnableMenuItem
GetDlgItem
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
GetFocus
IsWindowEnabled
IsWindow
SetFocus
MessageBoxA
WinHelpA
EnableWindow
UpdateWindow
SetDebugErrorLevel
PostMessageA
SendMessageA
CreateWindowExA
UnregisterClassA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
comdlg32
FindTextA
GetOpenFileNameA
CommDlgExtendedError
GetFileTitleA
GetSaveFileNameA
ReplaceTextA
comctl32
ImageList_LoadImageA
ImageList_Destroy
ord17
ImageList_Draw
shell32
ExtractIconA
DragAcceptFiles
DragQueryFileA
DragFinish
SHBrowseForFolderA
ShellExecuteExA
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteA
SHGetFileInfoA
Sections
.text Size: 407KB - Virtual size: 407KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 198KB - Virtual size: 200KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE