Static task
static1
Behavioral task
behavioral1
Sample
b0ec183e830c72c682f8c4f61cd7cbdff7b499aaa0cf42e664ce0fb816aca394.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b0ec183e830c72c682f8c4f61cd7cbdff7b499aaa0cf42e664ce0fb816aca394.exe
Resource
win10v2004-20221111-en
General
-
Target
b0ec183e830c72c682f8c4f61cd7cbdff7b499aaa0cf42e664ce0fb816aca394
-
Size
128KB
-
MD5
12556d090c4e382c3ef532e04f385370
-
SHA1
6aed282cf7c423c4882cc5c4caac837641c1c0d9
-
SHA256
b0ec183e830c72c682f8c4f61cd7cbdff7b499aaa0cf42e664ce0fb816aca394
-
SHA512
7e97433a87dbbea9ac109c0d4358da7a12f2839fae19c125f7a85927c215d7fc02e9ea56697d7d975e9cb95edde809ace91e8141dbcb53c150472da29a62e0f9
-
SSDEEP
3072:Hx5o/k3WHhXWzEPlJFSI47KgSDADeak7dJHB/AdGz:HxlihBTv41SsQLH5Adq
Malware Config
Signatures
Files
-
b0ec183e830c72c682f8c4f61cd7cbdff7b499aaa0cf42e664ce0fb816aca394.exe windows x86
f2406342f3b89f83b6b72f92ddc43bfc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
DeleteFileA
IsBadWritePtr
IsBadReadPtr
GetLastError
GetTempFileNameA
GetTempPathA
GetPrivateProfileSectionA
GetModuleFileNameA
ResumeThread
GetPrivateProfileStringA
WaitForSingleObject
CreateProcessA
CloseHandle
LCMapStringW
LCMapStringA
ReadFile
SetEndOfFile
LoadLibraryA
GetProcAddress
GetOEMCP
GetACP
GetCPInfo
CreateFileA
GetStringTypeW
CreateThread
GetCurrentThreadId
TlsSetValue
TlsGetValue
ExitThread
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
HeapFree
RaiseException
TlsAlloc
SetLastError
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
EnterCriticalSection
LeaveCriticalSection
WriteFile
InitializeCriticalSection
HeapReAlloc
HeapSize
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
SetUnhandledExceptionFilter
SetFilePointer
InterlockedDecrement
InterlockedIncrement
IsBadCodePtr
SetStdHandle
FlushFileBuffers
MultiByteToWideChar
GetStringTypeA
user32
wsprintfA
SetWindowLongA
MoveWindow
DialogBoxParamA
GetDesktopWindow
DestroyWindow
advapi32
RegSetValueExA
RegCreateKeyExA
shell32
ShellExecuteA
wininet
InternetCloseHandle
InternetCrackUrlA
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetSetStatusCallback
InternetCanonicalizeUrlA
InternetOpenA
InternetReadFile
shlwapi
PathAppendA
Sections
.text Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ