Static task
static1
Behavioral task
behavioral1
Sample
bbb5187f0f20cad7fea514455706b922fca707775e7884cd5e8fc798052a1191.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bbb5187f0f20cad7fea514455706b922fca707775e7884cd5e8fc798052a1191.exe
Resource
win10v2004-20220812-en
General
-
Target
bbb5187f0f20cad7fea514455706b922fca707775e7884cd5e8fc798052a1191
-
Size
740KB
-
MD5
9dfde97c1c4405efdd8a5251a616f62d
-
SHA1
5b9fec92714726fa5d2fa88169aaec702ac53516
-
SHA256
bbb5187f0f20cad7fea514455706b922fca707775e7884cd5e8fc798052a1191
-
SHA512
e23a0605deabbfa40943e85f1c6759e9ebe1da3b7c16d75fdd32369f6bc1841b76042e4ad9ad18b48ad03d0edf811a4d94e66f89d0f8619f198c4253ba40047b
-
SSDEEP
12288:YyxUcfH81ctJ32+xC6NOPNWjIZT1XOzmhr8jrQ5/lGsU9kKARBCs4vuQHFo7MY8f:ocectp2+xC6NOPNWjIjOzmhirQ5/lG/7
Malware Config
Signatures
Files
-
bbb5187f0f20cad7fea514455706b922fca707775e7884cd5e8fc798052a1191.exe windows x86
6f74612eaf3bfb86c54ee9769537e9c5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
shell32
SHGetMalloc
SHGetFileInfoW
CommandLineToArgvW
ShellExecuteW
ShellExecuteExW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
kernel32
CreateFileA
FreeLibrary
GetProcessHeap
HeapAlloc
GetLastError
GetProcAddress
HeapFree
LoadLibraryW
GetModuleFileNameW
LocalFree
WaitForSingleObject
CreateProcessW
SetCurrentDirectoryW
GetCurrentDirectoryW
CloseHandle
SetFileApisToOEM
GetCurrentThread
SetPriorityClass
GetEnvironmentVariableW
SetThreadPriority
GetCurrentProcess
GetModuleHandleW
GetVersionExW
CreateFileW
ExpandEnvironmentStringsW
GetCommandLineW
GetFileAttributesW
RemoveDirectoryW
CreateDirectoryW
DeleteFileW
FindNextFileW
FindFirstFileW
FindClose
FormatMessageW
InterlockedExchangeAdd
SetEndOfFile
SetFileTime
WriteFile
GetFileSize
ReadFile
SetFilePointer
MultiByteToWideChar
WideCharToMultiByte
GetACP
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetFileAttributesW
GetLongPathNameW
MoveFileW
lstrlenW
GetTempPathW
GetFullPathNameW
GetWindowsDirectoryW
GetTempFileNameW
SetEvent
ResetEvent
CreateEventW
FindResourceW
FileTimeToSystemTime
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
LoadLibraryA
HeapReAlloc
VirtualAlloc
FlushFileBuffers
GetConsoleMode
GetConsoleCP
LCMapStringW
LCMapStringA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
WaitForMultipleObjects
ResumeThread
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetVersionExA
GetStartupInfoW
ExitThread
GetCurrentThreadId
CreateThread
RaiseException
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sleep
HeapSize
ExitProcess
GetStdHandle
GetModuleFileNameA
GetCPInfo
GetOEMCP
IsValidCodePage
user32
LoadIconW
ScreenToClient
TranslateMessage
IsWindowVisible
EnableWindow
GetMessageW
DispatchMessageW
SetTimer
DestroyIcon
IsWindow
MessageBoxW
ShowWindow
PostMessageW
DialogBoxParamW
SetWindowPos
GetWindowRect
GetSystemMetrics
GetDlgItem
SendMessageW
EndDialog
SetFocus
GetWindowTextW
SetWindowTextW
CreateDialogParamW
IsDialogMessageW
GetActiveWindow
GetDesktopWindow
LoadStringW
PostQuitMessage
KillTimer
gdi32
CreateSolidBrush
DeleteObject
ole32
CoUninitialize
CoTaskMemFree
CoInitializeEx
CoCreateInstance
CoInitialize
Sections
.text Size: 255KB - Virtual size: 255KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ