Static task
static1
Behavioral task
behavioral1
Sample
b85055313bf425aa5d103b4fd6d7cbf0e27bdd9020b65218403cfeaedf905e23.exe
Resource
win7-20221111-en
General
-
Target
b85055313bf425aa5d103b4fd6d7cbf0e27bdd9020b65218403cfeaedf905e23
-
Size
908KB
-
MD5
498a7c9ccfea703120724b067fb72248
-
SHA1
93ec9c68b5db22d3410f7739c53a4fa528a894e2
-
SHA256
b85055313bf425aa5d103b4fd6d7cbf0e27bdd9020b65218403cfeaedf905e23
-
SHA512
b78650cb7fe157696d9d92b454640a11dd3a6bf3aae59e1e766c3cfff3676cc5b126cd265cae943dfe3ff1d399280c8b61043421808801a49aea36db78ccedf7
-
SSDEEP
12288:5wKjkpTY7YIAK/f5Yt5ZOwl9lz4CG5DUI0pYk28GjQmzT04:Vkp2YIx091rGGI0p92HjQmn0
Malware Config
Signatures
Files
-
b85055313bf425aa5d103b4fd6d7cbf0e27bdd9020b65218403cfeaedf905e23.exe windows x86
02f18b3a26350ff89a997a8c44703df9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoA
GetThreadLocale
GetVersionExA
GetVersionExW
GetWindowsDirectoryA
GetWindowsDirectoryW
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
InterlockedExchange
InterlockedIncrement
LeaveCriticalSection
LocalAlloc
LocalFree
MoveFileExW
MultiByteToWideChar
GetProcessHeap
RaiseException
ReleaseMutex
SetEvent
SetFileAttributesA
SetFilePointer
SetLastError
SetThreadExecutionState
SetThreadLocale
Sleep
WaitForMultipleObjects
WideCharToMultiByte
WriteFile
lstrcmpW
lstrcpyA
lstrlenA
GetModuleHandleW
VirtualAllocEx
GetModuleHandleA
GetModuleFileNameW
GetLastError
GetCurrentThreadId
GetComputerNameW
FormatMessageW
FormatMessageA
ExitProcess
EnterCriticalSection
DeleteFileA
DeleteCriticalSection
CreateProcessW
CreateMutexA
CreateFileA
CreateEventA
OutputDebugStringW
CloseHandle
user32
SetTimer
SetWindowTextW
LoadIconA
LoadIconW
SetFocus
SetCursor
SendMessageW
PostMessageW
MessageBoxW
MessageBoxA
MapDialogRect
LoadCursorW
KillTimer
GetWindowTextW
GetWindowRect
GetForegroundWindow
GetDlgItem
EndDialog
DialogBoxParamW
CharLowerW
SetForegroundWindow
gdi32
GetTextMetricsW
GetTextExtentPointW
DeleteDC
SelectObject
CreateDCW
advapi32
RegOpenKeyA
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
GetUserNameW
RegCloseKey
RegDeleteKeyW
RegDeleteValueW
RegQueryValueExA
msvcrt
_XcptFilter
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_abnormal_termination
_acmdln
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
_iob
_mbscmp
_mbscpy
_mbsicmp
_mbsinc
_mbslwr
_mbsnbcmp
_mbsnbicmp
_snwprintf
_vsnwprintf
_wcsicmp
_wcsnicmp
exit
fwprintf
iswctype
memmove
setlocale
wcschr
wcscmp
wcscpy
wcslen
wcsncmp
wcsrchr
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 827KB - Virtual size: 827KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aa Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ