Static task
static1
Behavioral task
behavioral1
Sample
b4d90133ff939821a1daf391dac218aea47dffc7246d1a6e04904b2ab03495ab.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b4d90133ff939821a1daf391dac218aea47dffc7246d1a6e04904b2ab03495ab.exe
Resource
win10v2004-20220812-en
General
-
Target
b4d90133ff939821a1daf391dac218aea47dffc7246d1a6e04904b2ab03495ab
-
Size
760KB
-
MD5
449c36937cd692a7bafd67cb39f89f22
-
SHA1
606f290b0ee110a11b1c24c748413b591b326295
-
SHA256
b4d90133ff939821a1daf391dac218aea47dffc7246d1a6e04904b2ab03495ab
-
SHA512
2ea325969c8b122e152fcf498b10d6d5bfcbdf2b766b82fb0b22a2ed1733e143e763fe0f38c50c183c1adcf27e36749f7a1b4a15821d3d68c45cd0725b7c24f8
-
SSDEEP
12288:NV64ERCGLbJ6hLd5PvLILNDiy5RdCbjlfCsw5U53ZjwRjyVWseWwMqKcYLND2:NVBERNEhLdJqdHCbjlfH3wRjyYLWwMqN
Malware Config
Signatures
Files
-
b4d90133ff939821a1daf391dac218aea47dffc7246d1a6e04904b2ab03495ab.exe windows x86
33367a09bcb843b1dc2307b2e78ce366
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
gdi32
SelectObject
SetTextColor
SetBkMode
DeleteDC
GetDeviceCaps
DeleteObject
kernel32
GetVersion
GetCommandLineA
GetCurrentProcessId
GetModuleHandleA
GetCurrentThread
GetLastError
GetTickCount
GetCurrentThreadId
ExitProcess
HeapAlloc
GetProcessHeap
ResetEvent
VirtualAlloc
SetConsoleCtrlHandler
Sleep
VirtualFree
UnmapViewOfFile
IsValidCodePage
CreateProcessA
SizeofResource
FindResourceA
GetModuleHandleW
GetACP
CloseHandle
ReadFile
SetFilePointer
TlsFree
RaiseException
InterlockedCompareExchange
HeapSize
WideCharToMultiByte
LockResource
GetEnvironmentStrings
lstrlenW
GlobalUnlock
GetEnvironmentStringsW
LCMapStringA
GetConsoleCP
GlobalFree
lstrlenA
GetSystemInfo
HeapCreate
LCMapStringW
LeaveCriticalSection
CreateFileA
TlsSetValue
GetFileType
CreateEventA
CreateFileW
GetTimeZoneInformation
GetModuleFileNameA
GetProcAddress
WaitForMultipleObjects
DuplicateHandle
FindFirstFileW
CreateFileMappingA
CompareStringA
FindFirstFileA
GlobalLock
DeleteFileW
SetEvent
GetWindowsDirectoryA
CreateDirectoryA
GetStartupInfoA
LoadLibraryA
GetVersionExA
TlsAlloc
QueryPerformanceCounter
FreeLibrary
LoadLibraryW
SetHandleCount
EnterCriticalSection
HeapFree
InterlockedIncrement
SetEndOfFile
GlobalAlloc
WriteConsoleA
SetUnhandledExceptionFilter
TerminateProcess
GetSystemDirectoryA
CreateThread
MultiByteToWideChar
UnhandledExceptionFilter
GetPrivateProfileStringA
LoadLibraryExA
RemoveDirectoryA
FlushFileBuffers
IsDebuggerPresent
GetModuleFileNameW
TlsGetValue
SetLastError
FormatMessageA
InterlockedDecrement
FindClose
LoadResource
LocalFree
GetOEMCP
GetStringTypeW
SetStdHandle
WriteFile
InterlockedExchange
GetSystemTimeAsFileTime
GetStringTypeA
lstrcmpiA
GetCPInfo
GetTempPathA
FreeEnvironmentStringsW
SetErrorMode
LocalAlloc
GetLocaleInfoA
GetConsoleMode
GetCurrentProcess
DeleteCriticalSection
GetFileAttributesW
HeapDestroy
WaitForSingleObject
GetFileAttributesA
GetConsoleOutputCP
GetStdHandle
oleaut32
SysAllocStringLen
VariantInit
SysAllocString
VariantClear
user32
SetCursor
CallWindowProcA
SendMessageA
SystemParametersInfoA
GetSysColor
DialogBoxParamA
MessageBoxA
SetDlgItemTextA
LoadCursorA
ScreenToClient
GetDlgItem
SetTimer
SetWindowTextA
EndDialog
PostMessageA
GetWindowRect
GetSystemMetrics
DefWindowProcA
BeginPaint
EndPaint
CreateWindowExA
GetWindowLongA
IsIconic
SetForegroundWindow
GetWindow
PeekMessageA
EnableWindow
ShowWindow
DestroyWindow
ReleaseDC
GetDC
IsWindow
SetWindowPos
PostQuitMessage
Sections
.text Size: 726KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ