Static task
static1
Behavioral task
behavioral1
Sample
b904bcc0f6da7e41cf27542cc3c691900272987a9b5988bc324fca96210f8ae9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b904bcc0f6da7e41cf27542cc3c691900272987a9b5988bc324fca96210f8ae9.exe
Resource
win10v2004-20220901-en
General
-
Target
b904bcc0f6da7e41cf27542cc3c691900272987a9b5988bc324fca96210f8ae9
-
Size
176KB
-
MD5
05726a19b979dae658d0a3f67e3df5f0
-
SHA1
ee1d10bc105ee02a6eb47accc1e667d4863ca745
-
SHA256
b904bcc0f6da7e41cf27542cc3c691900272987a9b5988bc324fca96210f8ae9
-
SHA512
8d9e61d4a65bfa83eaa4fccd8954f06d7bfe1e19bc1b375ef059cba261fbc7af538eacc30914dbb92bf30a436d41c0153b41742aa1a9aa24795bbefa74b7eb17
-
SSDEEP
3072:GJ4ujspDuTsIDV/gWtgapfGOLxJUgi9WSV4x7KEigdG:GJtwSsIJ/g9apeOLjb6VV4M
Malware Config
Signatures
Files
-
b904bcc0f6da7e41cf27542cc3c691900272987a9b5988bc324fca96210f8ae9.exe windows x86
d4c6a3874d683fe5405d74d8fa250f1e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
user32
GetSystemMetrics
MonitorFromWindow
SetActiveWindow
MonitorFromPoint
GetDesktopWindow
GetDC
LoadCursorA
SetWindowPos
RegisterClassA
DestroyWindow
WindowFromDC
ReleaseDC
GetClientRect
LoadIconA
ScrollWindowEx
CharNextW
GetMonitorInfoA
DefWindowProcA
EnumDisplayMonitors
CreateWindowExA
GetActiveWindow
GetWindowRect
OffsetRect
UnregisterClassA
kernel32
UnhandledExceptionFilter
lstrlenW
GetCalendarInfoW
ReleaseMutex
GetLocaleInfoA
GetCurrentDirectoryA
CloseHandle
SetUnhandledExceptionFilter
FindFirstFileA
WaitForSingleObject
GetProfileStringW
TerminateProcess
GetTempPathW
LocalAlloc
TlsSetValue
GetProcAddress
GetDateFormatW
GetCurrentProcessId
QueryPerformanceCounter
FindNextFileA
GetLastError
CreateSemaphoreA
SetCurrentDirectoryA
ExitProcess
LeaveCriticalSection
WideCharToMultiByte
GetSystemInfo
lstrcmpW
GetThreadPriority
InterlockedCompareExchange
GetCurrentThread
GlobalUnlock
GetCurrentProcess
GetModuleFileNameA
ReleaseSemaphore
GetWindowsDirectoryA
GetTimeFormatW
Sleep
InterlockedIncrement
MultiByteToWideChar
InterlockedExchange
IsDebuggerPresent
EnumResourceNamesA
GetDateFormatA
GetUserDefaultLangID
GetEnvironmentVariableW
GetTickCount
CreateFileA
GlobalSize
GetSystemDirectoryA
GetTimeFormatA
GlobalAlloc
ReadFile
InitializeCriticalSection
GetSystemDefaultLCID
DeleteFileW
SetThreadPriority
GlobalFree
CreateMutexA
GetVersionExA
GetLocalTime
GetFileTime
GetCurrentThreadId
LoadLibraryA
GetModuleHandleA
TlsGetValue
GetACP
GetThreadLocale
GetSystemTimeAsFileTime
DeleteCriticalSection
GetFileSize
IsProcessorFeaturePresent
GlobalLock
FreeLibrary
EnterCriticalSection
FindClose
TlsFree
RaiseException
gdi32
PolyBezierTo
SetROP2
EqualRgn
StartPage
SelectObject
GetCurrentObject
GetObjectA
IntersectClipRect
StretchBlt
CreateICW
CloseFigure
GetDIBColorTable
Rectangle
DeleteDC
MoveToEx
EndPage
PatBlt
GetViewportOrgEx
OffsetRgn
PolylineTo
RealizePalette
StrokePath
CreateDIBSection
GetGraphicsMode
StretchDIBits
EndDoc
BitBlt
RestoreDC
EndPath
LineTo
CombineRgn
CreateBrushIndirect
AbortDoc
BeginPath
ModifyWorldTransform
CreatePatternBrush
ExtEscape
GetRegionData
ExtCreatePen
ExtSelectClipRgn
Escape
SetGraphicsMode
SetStretchBltMode
SelectPalette
GetStockObject
SetBrushOrgEx
GetDeviceCaps
CreateCompatibleDC
CreatePalette
GetRgnBox
SetDIBits
GetClipBox
CreateBitmap
CreatePolyPolygonRgn
GetWorldTransform
FillPath
ResetDCW
CreateRectRgn
CreateDCW
SelectClipRgn
SaveDC
StartDocW
SetPolyFillMode
CreateCompatibleBitmap
SetMiterLimit
SetWorldTransform
SelectClipPath
DeleteObject
PolyDraw
ole32
CLSIDFromProgID
CoFreeUnusedLibraries
OleInitialize
OleIsCurrentClipboard
CoCreateInstance
CoRetireServer
CoUninitialize
CoTaskMemFree
CoRegisterMessageFilter
CoGetClassObject
CoInitialize
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoTaskMemAlloc
OleFlushClipboard
OleUninitialize
CoRevokeClassObject
CreateILockBytesOnHGlobal
CLSIDFromString
shlwapi
PathRemoveFileSpecA
PathAppendA
msimg32
AlphaBlend
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 1024B - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ