Static task
static1
Behavioral task
behavioral1
Sample
5bb88e08c1a08871a99adce0f3ae6f34c855c460f0ac77437cb4c73235824ab7.exe
Resource
win10v2004-20221111-en
General
-
Target
5bb88e08c1a08871a99adce0f3ae6f34c855c460f0ac77437cb4c73235824ab7
-
Size
234KB
-
MD5
bbf813ba0ead26fad5ca73846aaac0cf
-
SHA1
c7cf1d788f354f205a898fc6481977d7f29a9fe7
-
SHA256
5bb88e08c1a08871a99adce0f3ae6f34c855c460f0ac77437cb4c73235824ab7
-
SHA512
8f816eb442a250cd3dfa2d4573a617eafc92498d604ae10a69b8c848499412ccb9aca70fae504e89aa533917035af20a817830719a07e93a51bd92c7ec1d63c9
-
SSDEEP
3072:o6OIOpy4TM4rFdMyJdBA/V0BV8lUkOnFXpnahpDI6RFlScQqiBAXgV0Bx92eedD1:oFTMQUgMqFl2cMlScQq192e+CfF1w
Malware Config
Signatures
Files
-
5bb88e08c1a08871a99adce0f3ae6f34c855c460f0ac77437cb4c73235824ab7.exe windows x86
8c8508edec1c956004908c27f8edc2f4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
MultiByteToWideChar
ReadConsoleW
SetInformationJobObject
VerLanguageNameW
SetFileValidData
LockFile
InitializeCriticalSection
GetFileSize
GetPriorityClass
WriteConsoleOutputCharacterW
AreFileApisANSI
GetThreadPriority
CreateEventW
GetNativeSystemInfo
SetEndOfFile
GetTapeParameters
FreeConsole
lstrcmpW
AssignProcessToJobObject
DeleteAtom
GetLogicalDrives
AddAtomW
GetCurrentProcessId
GetNumaNodeProcessorMask
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
InitializeCriticalSectionAndSpinCount
LoadLibraryA
HeapSize
HeapReAlloc
GetProcAddress
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
DeleteCriticalSection
GetStartupInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStdHandle
WriteFile
ExitProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapAlloc
HeapFree
InterlockedDecrement
GetLastError
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
GetCommandLineA
RaiseException
RtlUnwind
VirtualAlloc
Sleep
user32
UnregisterClassA
CheckRadioButton
IsWindow
GetSystemMetrics
EnableWindow
GetWindowTextA
RedrawWindow
FindWindowA
SetWindowPos
wvsprintfA
GetWindowLongA
SetCursor
GetSysColorBrush
DialogBoxParamA
DestroyAcceleratorTable
DispatchMessageA
TranslateMessage
LoadIconA
SetClipboardData
SetFocus
CharUpperA
OpenClipboard
IsDialogMessageA
TranslateAcceleratorA
GetMessageA
LoadAcceleratorsA
RemoveMenu
InvalidateRect
ChildWindowFromPoint
PostMessageA
DestroyCursor
CreateDialogParamA
GetWindowRect
IsMenu
GetSubMenu
SetDlgItemInt
GetWindowPlacement
CharLowerBuffA
EnableMenuItem
CheckMenuRadioItem
GetSysColor
KillTimer
DestroyIcon
DestroyWindow
PostQuitMessage
GetClientRect
MoveWindow
GetSystemMenu
SetTimer
SetWindowPlacement
InsertMenuItemA
GetMenu
CheckMenuItem
SetMenuItemInfoA
SetActiveWindow
DefDlgProcA
RegisterClassA
EndDialog
SetDlgItemTextA
EnumClipboardFormats
GetClipboardData
CloseClipboard
GetClassInfoA
CallWindowProcA
SetWindowLongA
IsDlgButtonChecked
SetWindowTextA
CheckDlgButton
GetActiveWindow
LoadCursorA
MessageBoxA
wsprintfA
GetDlgItemTextA
SendMessageA
GetCursorPos
TrackPopupMenu
ClientToScreen
DestroyMenu
CreatePopupMenu
AppendMenuA
SendDlgItemMessageA
GetDlgItem
EmptyClipboard
advapi32
DecryptFileW
Sections
.text Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 143KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE