Static task
static1
Behavioral task
behavioral1
Sample
b25ebad5a5f1604cb3f276da4b10bcff134e6f684679ad00c53adfbc90add51b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b25ebad5a5f1604cb3f276da4b10bcff134e6f684679ad00c53adfbc90add51b.exe
Resource
win10v2004-20220812-en
General
-
Target
b25ebad5a5f1604cb3f276da4b10bcff134e6f684679ad00c53adfbc90add51b
-
Size
600KB
-
MD5
e169acee23ab3d2861b43927d3ac9be1
-
SHA1
c217fa33a3748b42f7f1bc64831ca3e9ce490d96
-
SHA256
b25ebad5a5f1604cb3f276da4b10bcff134e6f684679ad00c53adfbc90add51b
-
SHA512
e979279406252abf564a4a38d3f88e7cabcee58a800112b80050cf175060cc2251a2c70de9c7bc1d0e6fb5bb9d934d86f14adc8cd6e811679e3d968006e497bd
-
SSDEEP
12288:3foEIyN58FKzJleFLdeAjBFWaY9eH5xrjwHbCEf82YvXIDPttd:3foEIyN58FK9lM4A9FWKnH0b582mX4Vt
Malware Config
Signatures
Files
-
b25ebad5a5f1604cb3f276da4b10bcff134e6f684679ad00c53adfbc90add51b.exe windows x86
33fa7e83794068c3a3bf0990a3362ef7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadModule
_lwrite
MoveFileA
WideCharToMultiByte
ProcessIdToSessionId
CreateIoCompletionPort
IsValidLanguageGroup
FindFirstFileA
WriteProfileSectionW
FatalAppExitA
CreateEventW
GetCompressedFileSizeA
GetTimeFormatW
CallNamedPipeA
CompareFileTime
GetLogicalDriveStringsA
GetThreadPriorityBoost
CreateEventA
GetCurrentDirectoryA
FreeLibraryAndExitThread
GetVolumeNameForVolumeMountPointA
CreateNamedPipeA
WriteProfileSectionA
GetCurrencyFormatA
GetThreadLocale
CreateDirectoryW
FatalExit
lstrcpyA
SetCurrentDirectoryA
GetProcessWorkingSetSize
GetCommMask
GetProcessHeaps
GetCurrentProcessId
GlobalHandle
IsBadHugeWritePtr
GetPrivateProfileSectionNamesW
CreateDirectoryExA
SetThreadLocale
GetLongPathNameW
OpenFileMappingA
LockFile
GetVolumeInformationW
GetVersionExA
PrepareTape
ReadFileScatter
PeekNamedPipe
GetFileAttributesW
WaitForDebugEvent
EnumDateFormatsExA
SetTimeZoneInformation
SearchPathA
GetCommTimeouts
GetQueuedCompletionStatus
SetFileApisToANSI
GetBinaryTypeA
CreateTimerQueue
UnmapViewOfFile
TlsAlloc
DeleteVolumeMountPointA
GetSystemWindowsDirectoryW
ExpandEnvironmentStringsW
GlobalAddAtomW
GetFileSize
SystemTimeToTzSpecificLocalTime
EnumResourceLanguagesW
IsValidCodePage
FindResourceExW
FindNextChangeNotification
SetEnvironmentVariableW
GlobalGetAtomNameW
SetHandleCount
DosDateTimeToFileTime
WaitForSingleObjectEx
lstrcpynW
LockResource
EnumLanguageGroupLocalesW
BackupSeek
GetPrivateProfileSectionW
RtlUnwind
GetFullPathNameA
DeviceIoControl
GetFileAttributesA
GetTempPathW
CompareStringW
EnumResourceLanguagesA
RemoveDirectoryW
FreeUserPhysicalPages
FreeEnvironmentStringsA
GetProcessVersion
GetSystemTimeAdjustment
GetDateFormatW
CreateMailslotA
QueueUserWorkItem
SizeofResource
SetVolumeMountPointW
lstrcpynA
GetShortPathNameA
GetCurrencyFormatW
FreeLibrary
FindFirstVolumeMountPointA
Process32NextW
GetStdHandle
SetupComm
GetNamedPipeHandleStateA
SetMailslotInfo
GetDevicePowerState
CreateFileA
EndUpdateResourceA
GetVersionExW
CreateFileMappingA
GetEnvironmentVariableW
ContinueDebugEvent
GetPriorityClass
GetLogicalDrives
GetSystemDefaultLCID
FreeEnvironmentStringsW
ReplaceFileA
GetSystemTimeAsFileTime
CreateJobObjectW
_llseek
shlwapi
PathAppendA
user32
DestroyAcceleratorTable
DialogBoxIndirectParamA
GetWindowWord
VkKeyScanExA
DrawCaption
EqualRect
EnumThreadWindows
CloseWindowStation
CreateCursor
BeginPaint
DragObject
GetNextDlgGroupItem
EnumPropsW
CharNextExA
ExcludeUpdateRgn
OemKeyScan
LoadAcceleratorsW
DefMDIChildProcA
CreateDesktopA
GetClipCursor
SystemParametersInfoA
WaitMessage
DrawStateW
GetProcessDefaultLayout
DdeUninitialize
DrawFrame
GetMessageExtraInfo
Sections
.text Size: 199KB - Virtual size: 199KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 225KB - Virtual size: 436KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 170KB - Virtual size: 170KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ