Static task
static1
Behavioral task
behavioral1
Sample
b8ee83f09c15c7a11f5c0a7fa686cf0cfa7f561e8d7d9dfb303cbfc2bce246e0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b8ee83f09c15c7a11f5c0a7fa686cf0cfa7f561e8d7d9dfb303cbfc2bce246e0.exe
Resource
win10v2004-20220812-en
General
-
Target
b8ee83f09c15c7a11f5c0a7fa686cf0cfa7f561e8d7d9dfb303cbfc2bce246e0
-
Size
939KB
-
MD5
d9b017b1800c44d367ff21125a528d17
-
SHA1
c01d613dc8bf2e251b7d3e6180e01895f175697c
-
SHA256
b8ee83f09c15c7a11f5c0a7fa686cf0cfa7f561e8d7d9dfb303cbfc2bce246e0
-
SHA512
9a0b22b4ff1f73a64e39c94a47eb8d1eabd13e6909add29d921130b1549b65a806fd8b62e2e30f1fc1e882f6ba44f23b2f664428b82ffc7a6566fc9d322e01a9
-
SSDEEP
24576:+/5UCvsU0yUU1Rm2k/gqTT8MfECZPcxvSD:EeCvszrU1HCg0TcCZP/D
Malware Config
Signatures
Files
-
b8ee83f09c15c7a11f5c0a7fa686cf0cfa7f561e8d7d9dfb303cbfc2bce246e0.exe windows x86
1b1af407f55dc143fb72d5cd2192970a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DdeAccessData
SetSystemCursor
GetMenuCheckMarkDimensions
VkKeyScanExA
IsCharAlphaNumericW
UnregisterDeviceNotification
ExitWindowsEx
GetMenuBarInfo
GetClientRect
GetDesktopWindow
AdjustWindowRectEx
AllowSetForegroundWindow
AnimateWindow
GetSystemMetrics
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
DdeInitializeA
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
FillRect
DrawTextA
EndPaint
ShowWindow
MapVirtualKeyExW
GetThreadDesktop
DdeQueryNextServer
GetUpdateRgn
shell32
DragAcceptFiles
ExtractAssociatedIconA
ExtractIconA
DragQueryFileW
ShellExecuteExA
DoEnvironmentSubstW
SHGetSpecialFolderLocation
SHFileOperationA
ShellExecuteA
SHGetFileInfoA
SHBrowseForFolderA
SHGetPathFromIDListA
DoEnvironmentSubstA
ole32
CoTreatAsClass
CoCreateInstance
CoGetClassObject
OleInitialize
CoTaskMemFree
CreateDataAdviseHolder
CoMarshalInterThreadInterfaceInStream
OleUninitialize
CoRevertToSelf
advapi32
RegCloseKey
SetFileSecurityA
RegOpenKeyExW
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegRestoreKeyA
RegCreateKeyExA
EqualSid
DuplicateToken
ObjectCloseAuditAlarmA
EnumDependentServicesA
LookupPrivilegeNameA
DeleteAce
gdi32
GetDeviceCaps
DeleteObject
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
CloseMetaFile
CopyEnhMetaFileA
CreateCompatibleDC
CloseFigure
CreateBrushIndirect
CreateDIBitmap
CreateDIBPatternBrush
AddFontResourceW
AbortPath
CreateBitmap
CancelDC
SetBkColor
opengl32
glInitNames
glRasterPos3d
glTexCoord4i
glMapGrid1d
glCallList
glMap1d
glPixelZoom
comctl32
ImageList_Destroy
ImageList_Create
ImageList_AddMasked
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
kernel32
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetCPInfo
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetStdHandle
GetModuleHandleW
HeapCreate
HeapReAlloc
VirtualFree
HeapFree
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetStartupInfoA
GetSystemTimeAsFileTime
InterlockedDecrement
InterlockedIncrement
HeapAlloc
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
GetFileType
SetFileAttributesA
Sleep
GetTickCount
CreateFileA
SetLastError
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
SetFileTime
GetTempPathA
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
QueryPerformanceCounter
GetCurrentProcessId
InitializeCriticalSectionAndSpinCount
RtlUnwind
LCMapStringA
LCMapStringW
HeapSize
GetLocaleInfoW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetCurrentThreadId
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
RaiseException
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
GetFileSize
SetHandleCount
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
CreateDirectoryA
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
VirtualAlloc
IsValidLanguageGroup
SetComputerNameExA
FatalAppExitA
GenerateConsoleCtrlEvent
FillConsoleOutputCharacterA
GetProfileStringW
ReadConsoleInputW
SetPriorityClass
GetWindowsDirectoryA
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
SetFilePointer
MulDiv
ReadFile
WriteFile
GetPrivateProfileStringA
WritePrivateProfileStringA
GlobalFree
Sections
.rdata Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wonderf Size: 169KB - Virtual size: 27.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 732KB - Virtual size: 732KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ