Static task
static1
Behavioral task
behavioral1
Sample
b172686c8ada283d3caaed5dace2a8f26dc5df5aafdc6140c97b4acf8dc81f71.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b172686c8ada283d3caaed5dace2a8f26dc5df5aafdc6140c97b4acf8dc81f71.exe
Resource
win10v2004-20221111-en
General
-
Target
b172686c8ada283d3caaed5dace2a8f26dc5df5aafdc6140c97b4acf8dc81f71
-
Size
252KB
-
MD5
56a136919d7f885193feef7619aa124c
-
SHA1
269e99a420faa3f9a06d6bd9a7e6c177560719a8
-
SHA256
b172686c8ada283d3caaed5dace2a8f26dc5df5aafdc6140c97b4acf8dc81f71
-
SHA512
f05063140165c081b63d9417e196d31f4f556bcfe532db87b0af69ca174f04025ed90c244c44a3097cd246f6ef7e5fbee486ceae7cd514afcb1df3862419191e
-
SSDEEP
6144:AUQazqVfUHh2Tjtz1SRg1qvGPsc0XOt9kMjXNre:MN5ch2lzgqkG03XO3xXN
Malware Config
Signatures
Files
-
b172686c8ada283d3caaed5dace2a8f26dc5df5aafdc6140c97b4acf8dc81f71.exe windows x86
0908b15c4815e322c195e21e5c0cde83
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryA
CreateMutexW
RemoveDirectoryW
_llseek
GetVersionExA
EnumResourceNamesW
GetCommState
SetStdHandle
CreateMutexA
QueryDosDeviceA
GetSystemInfo
VirtualAllocEx
lstrcpynA
TlsGetValue
SetSystemTime
WaitNamedPipeA
GetFileType
EnumResourceLanguagesW
SetErrorMode
LocalReAlloc
IsBadWritePtr
GetBinaryTypeA
FileTimeToLocalFileTime
_lread
DeleteCriticalSection
GetTempFileNameA
GetPrivateProfileStringW
GetAtomNameA
SizeofResource
VirtualLock
FillConsoleOutputCharacterA
GetPrivateProfileSectionW
GetUserDefaultLangID
GetLocaleInfoW
GetPrivateProfileStringA
_hread
CreateWaitableTimerA
ExpandEnvironmentStringsW
GetCommandLineA
lstrlenA
ExitProcess
VirtualAlloc
VirtualProtect
user32
EnumDesktopsW
GetMessageTime
UnhookWindowsHook
CharUpperW
OpenDesktopW
CloseWindow
GetScrollPos
IsIconic
GrayStringA
GetWindowInfo
GetForegroundWindow
UpdateWindow
WindowFromPoint
SendDlgItemMessageA
CreateWindowExA
LookupIconIdFromDirectory
GetWindowLongA
DefFrameProcA
EnumWindowStationsW
EnumClipboardFormats
PostThreadMessageA
OffsetRect
SetWindowsHookExW
MapVirtualKeyA
SendNotifyMessageA
ChangeDisplaySettingsW
FindWindowW
WinHelpA
CopyAcceleratorTableA
TranslateAcceleratorW
SubtractRect
GetUserObjectInformationW
SetProcessDefaultLayout
GetWindowTextW
gdi32
SetPixelFormat
CreateRoundRectRgn
CreateMetaFileA
comdlg32
GetFileTitleW
PageSetupDlgW
PageSetupDlgA
advapi32
SetEntriesInAclW
DeregisterEventSource
RegEnumKeyExA
RegEnumKeyA
RegisterServiceCtrlHandlerA
ChangeServiceConfigA
RevertToSelf
AddAccessDeniedAce
CryptImportKey
SetKernelObjectSecurity
OpenThreadToken
DestroyPrivateObjectSecurity
OpenProcessToken
RegSetValueExA
GetSidSubAuthority
RegSetValueA
GetNamedSecurityInfoA
RegRestoreKeyA
SetSecurityDescriptorSacl
RegReplaceKeyW
IsValidSecurityDescriptor
LockServiceDatabase
SetFileSecurityW
SetFileSecurityA
CryptGetHashParam
GetCurrentHwProfileW
OpenServiceW
QueryServiceStatus
CryptSetKeyParam
SetSecurityDescriptorGroup
shell32
DragQueryPoint
SHGetSpecialFolderPathW
SHGetSettings
ShellExecuteA
ole32
OleCreate
CoResumeClassObjects
OleSetContainedObject
OleQueryLinkFromData
oleaut32
SafeArrayGetLBound
SetErrorInfo
VariantChangeType
SafeArrayGetElement
SafeArrayRedim
SafeArrayPutElement
SysAllocStringLen
VariantCopy
comctl32
CreatePropertySheetPageA
ImageList_GetDragImage
shlwapi
wnsprintfA
PathGetCharTypeW
SHStrDupW
PathRemoveBlanksW
PathFileExistsW
PathRemoveArgsW
SHDeleteKeyA
StrChrIW
StrFormatKBSizeW
PathFindExtensionW
StrStrW
StrCmpW
PathCompactPathW
PathAppendA
SHRegOpenUSKeyW
PathIsRelativeW
PathIsURLW
Sections
.text Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 232KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE