Static task
static1
Behavioral task
behavioral1
Sample
b04d78e4068b6dc49b14f2d5539cb3c9eedd5bbdcfafcb4b34d4ca43f88545ac.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b04d78e4068b6dc49b14f2d5539cb3c9eedd5bbdcfafcb4b34d4ca43f88545ac.exe
Resource
win10v2004-20220812-en
General
-
Target
b04d78e4068b6dc49b14f2d5539cb3c9eedd5bbdcfafcb4b34d4ca43f88545ac
-
Size
666KB
-
MD5
cf41a510f837186ea5d612c47fba6357
-
SHA1
e3e83a88a3384d61e03f9440771ebd36d1504e1b
-
SHA256
b04d78e4068b6dc49b14f2d5539cb3c9eedd5bbdcfafcb4b34d4ca43f88545ac
-
SHA512
205761ac0542b317b0b09dc81da09480f7eb4a17b57efedf4cb849155f84e0bf3086bb561babecb8c0248d4320bc0d8f7e0360de906caf53f42b1f0d48db1c22
-
SSDEEP
12288:qs5/CtyU63c3di0lrMgUegr5ArDuytLvibanB3kGv7/Scl3sj4779UUL:p5/CRhESuytLvibYB3bvrSocj4N
Malware Config
Signatures
Files
-
b04d78e4068b6dc49b14f2d5539cb3c9eedd5bbdcfafcb4b34d4ca43f88545ac.exe windows x86
5d9386e32e3701a69e1139de2f32e0e2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DispatchMessageA
SetCursorPos
OffsetRect
ClientToScreen
TranslateMessage
wsprintfA
GetDC
ReleaseDC
GetMessageA
SetCursor
DefWindowProcA
SetWindowLongA
LoadCursorA
PostQuitMessage
MessageBoxA
GetWindowLongA
SetFocus
PeekMessageA
ShowWindow
CreateWindowExA
SetRect
WaitMessage
SetWindowPos
GetWindowRect
GetClientRect
RegisterClassA
GetSystemMetrics
LoadIconA
gdi32
GetDeviceCaps
GetStockObject
advapi32
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
ole32
CoInitialize
CoCreateInstance
CLSIDFromString
CoUninitialize
kernel32
WaitForSingleObject
SetEvent
MapViewOfFile
CreateFileMappingA
CloseHandle
OpenEventA
GetVersionExA
OutputDebugStringA
GetTickCount
GetTempPathA
GetDriveTypeA
_lcreat
_lopen
_lclose
_llseek
_lread
_lwrite
DeleteFileA
FindFirstFileA
FindNextFileA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetWindowsDirectoryA
GetSystemDirectoryA
RemoveDirectoryA
CreateDirectoryA
ExitProcess
TerminateProcess
GetCurrentProcess
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
HeapAlloc
HeapFree
HeapReAlloc
RaiseException
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
LCMapStringA
LCMapStringW
HeapSize
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetCPInfo
GetACP
GetOEMCP
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
SetUnhandledExceptionFilter
GetLastError
SetFilePointer
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
LoadLibraryA
SetStdHandle
FlushFileBuffers
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedExchange
EnterCriticalSection
GetCurrentProcessId
dsound
DirectSoundCreate
ddraw
DirectDrawCreate
winmm
timeGetTime
auxGetVolume
mciSendCommandA
timeKillEvent
waveOutGetNumDevs
auxGetDevCapsA
auxGetNumDevs
waveOutGetDevCapsA
auxSetVolume
waveOutGetVolume
timeSetEvent
waveOutSetVolume
avifil32
AVIStreamInfoA
AVIStreamStart
AVIStreamRead
AVIStreamReadFormat
AVIFileGetStream
AVIFileRelease
AVIStreamRelease
AVIFileExit
AVIFileInit
AVIFileOpenA
AVIStreamLength
AVIStreamSampleToTime
AVIStreamTimeToSample
msvfw32
ICLocate
ICDecompress
ICClose
ICSendMessage
Sections
.text Size: 501KB - Virtual size: 500KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 148KB - Virtual size: 330KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ