Static task
static1
Behavioral task
behavioral1
Sample
b0d77124da9a2f113e94048b821d0ded2c532a108871e2617344497e627afc54.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b0d77124da9a2f113e94048b821d0ded2c532a108871e2617344497e627afc54.exe
Resource
win10v2004-20220812-en
General
-
Target
b0d77124da9a2f113e94048b821d0ded2c532a108871e2617344497e627afc54
-
Size
111KB
-
MD5
3e331caf8b85d574487b0d1fb67d1ba0
-
SHA1
d8beb51fae68db2f23605a5bbcb232af03074a17
-
SHA256
b0d77124da9a2f113e94048b821d0ded2c532a108871e2617344497e627afc54
-
SHA512
6bd051bc6805609b72ac351cab18f61b6425eb48aa7710e12853c30b6024ef8e53d093c38898b5988d521b4f96b218a6c22dba7b4b33c0f2ee647c8ff27a7d49
-
SSDEEP
1536:R32jxh6koA6iHSPuCgRoD7yPwmRNtjuy118/QxMzAsKgdBM+SxTvwCiLEw9n:UthJogRsy3tF11KQurdBM+ZCQZ9n
Malware Config
Signatures
Files
-
b0d77124da9a2f113e94048b821d0ded2c532a108871e2617344497e627afc54.exe windows x86
130ee4efe7f86d04cbde744efd88c7a8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
FindTextW
GetOpenFileNameW
GetSaveFileNameW
shell32
ShellExecuteW
SHGetFileInfoW
Shell_NotifyIconW
ShellExecuteExW
ole32
CoInitialize
CoUninitialize
advapi32
GetFileSecurityW
gdi32
SetTextColor
SetBkMode
DeleteObject
GetStockObject
GetTextExtentPoint32W
SetBkColor
SelectObject
GetDeviceCaps
CreateFontIndirectW
kernel32
EncodeSystemPointer
InitAtomTable
FlushViewOfFile
GetProcessTimes
TlsSetValue
FindCloseChangeNotification
GetProcessPriorityBoost
GetCommandLineA
GetStdHandle
GetComputerNameExW
DefineDosDeviceW
SetSystemTimeAdjustment
ClearCommError
GlobalDeleteAtom
GetVersion
FindFirstFileExW
EraseTape
GetCurrentProcess
GetThreadTimes
LocalUnlock
DeleteAtom
ReplaceFileW
FindNextChangeNotification
GetCommTimeouts
ResetWriteWatch
SetFileValidData
GetAtomNameW
GetEnvironmentStrings
GetNumaNodeProcessorMask
MapUserPhysicalPagesScatter
GetThreadSelectorEntry
CreateIoCompletionPort
GetLogicalDrives
GlobalUnlock
RemoveVectoredExceptionHandler
WTSGetActiveConsoleSessionId
UpdateResourceW
EscapeCommFunction
CancelDeviceWakeupRequest
ResetEvent
GetFileInformationByHandle
SetProcessPriorityBoost
SetTapePosition
PulseEvent
GetExitCodeProcess
FlushInstructionCache
RequestWakeupLatency
GetExitCodeThread
GetProcessAffinityMask
PrepareTape
AssignProcessToJobObject
GetFileSize
LocalShrink
UnlockFile
ReadFileScatter
GetProcessHeap
GetModuleFileNameA
CreateFileMappingW
GetNamedPipeHandleStateA
GetProcessHandleCount
ConvertFiberToThread
GlobalUnWire
GetFileType
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
WriteFile
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
HeapSize
GetLocaleInfoA
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ