Static task
static1
Behavioral task
behavioral1
Sample
b6fe2b3d5f56beed126d24cbb2839e464dbcb933c8aea85e8b35153c6a0b7a9b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b6fe2b3d5f56beed126d24cbb2839e464dbcb933c8aea85e8b35153c6a0b7a9b.exe
Resource
win10v2004-20220812-en
General
-
Target
b6fe2b3d5f56beed126d24cbb2839e464dbcb933c8aea85e8b35153c6a0b7a9b
-
Size
732KB
-
MD5
e55f93d5dc29bfc9ed4044047621dc77
-
SHA1
67f25bdc2b71fa75125640c92686e3d76b35fd75
-
SHA256
b6fe2b3d5f56beed126d24cbb2839e464dbcb933c8aea85e8b35153c6a0b7a9b
-
SHA512
b504b34a56ee51e43c03589aa3b24d416fab8ceafd6e568f5068caabe3ad244779a682e2952c2ebc1dab5e1cae7c0b7dfaaae571b24d7c71b047069c6a256006
-
SSDEEP
12288:cG0ExgS7Dyi1Ic4aN5zK3N3QdzhWbpfHfBRTJhQLcTciY9yqKj:cG0EeS72i1Ic4aN5zKdgdobpnBRTPQLy
Malware Config
Signatures
Files
-
b6fe2b3d5f56beed126d24cbb2839e464dbcb933c8aea85e8b35153c6a0b7a9b.exe windows x86
f02d40c49c5775144c7a39b6d23c7d57
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
CryptEnumProviderTypesA
kernel32
CreateMutexA
WaitNamedPipeA
VirtualAlloc
EnumSystemCodePagesA
GetModuleHandleA
CreateMailslotA
GetCommandLineA
GetDateFormatA
GetProcAddress
CreateToolhelp32Snapshot
GetCurrentProcess
GetStdHandle
FreeEnvironmentStringsW
FlushViewOfFile
FreeLibrary
FileTimeToLocalFileTime
GetExitCodeProcess
WriteFile
GetFileAttributesExW
GetCurrentThread
UnhandledExceptionFilter
ExitProcess
SetEnvironmentVariableA
CompareStringW
HeapAlloc
SetStdHandle
GetNamedPipeHandleStateA
GetCurrentThreadId
WideCharToMultiByte
LCMapStringW
InterlockedCompareExchange
GetCommandLineW
LeaveCriticalSection
IsBadReadPtr
SetComputerNameA
GetStringTypeA
LoadModule
MapViewOfFile
TerminateProcess
RtlUnwind
InitializeCriticalSection
GetLongPathNameW
SleepEx
GetFileType
EnumCalendarInfoExA
LoadLibraryExA
GetSystemTime
GetSystemDirectoryA
GetCPInfo
DebugBreak
InterlockedExchange
InterlockedIncrement
GetVersion
GetNamedPipeInfo
GlobalUnfix
CompareStringA
LocalFlags
GetProcessAffinityMask
CreateDirectoryA
SetFilePointer
LockFile
FileTimeToDosDateTime
FreeResource
OpenMutexA
LoadLibraryA
VirtualQueryEx
ReadFile
SetCriticalSectionSpinCount
TlsFree
QueryPerformanceCounter
GlobalSize
GetStringTypeW
VirtualFree
DeleteCriticalSection
WritePrivateProfileStructA
CreateRemoteThread
SetLastError
GetLastError
HeapDestroy
RemoveDirectoryW
EnterCriticalSection
GetEnvironmentVariableW
HeapFree
TlsSetValue
OpenProcess
GlobalHandle
GetSystemTimeAsFileTime
HeapReAlloc
GetPrivateProfileSectionA
VirtualFreeEx
SetVolumeLabelW
FindResourceExW
InterlockedDecrement
IsBadWritePtr
SetCurrentDirectoryW
FreeEnvironmentStringsA
GlobalFlags
EnumResourceTypesW
HeapCreate
GetModuleFileNameA
GetThreadSelectorEntry
CloseHandle
TlsAlloc
LocalFileTimeToFileTime
GetTickCount
GetEnvironmentStringsW
CreateDirectoryExA
OpenFileMappingA
GetTimeZoneInformation
GetVolumeInformationW
GetFileAttributesExA
TlsGetValue
GetOEMCP
FlushFileBuffers
VirtualQuery
GetEnvironmentStrings
GetVersionExW
SetHandleCount
GetLogicalDriveStringsW
ReadConsoleInputW
GetStartupInfoA
GetCurrentProcessId
LCMapStringA
GetACP
lstrcpyn
MultiByteToWideChar
FindAtomW
GetLocalTime
EnumTimeFormatsW
GetTempPathW
comctl32
ImageList_GetBkColor
CreateStatusWindowW
ImageList_Write
ImageList_GetDragImage
CreateStatusWindowA
CreateToolbarEx
InitCommonControlsEx
ImageList_GetIconSize
ImageList_AddMasked
GetEffectiveClientRect
DrawInsert
ImageList_SetImageCount
ImageList_SetIconSize
ImageList_Merge
MakeDragList
ImageList_SetDragCursorImage
user32
VkKeyScanW
TabbedTextOutA
ScrollWindowEx
IsChild
GetMessagePos
CheckMenuItem
IsDialogMessageA
GetWindowTextW
MessageBoxW
CallWindowProcA
CreateDialogParamW
BlockInput
DefWindowProcA
DispatchMessageA
LoadKeyboardLayoutW
GetClassInfoW
LoadMenuIndirectA
MessageBoxA
GetDesktopWindow
AdjustWindowRect
GetMonitorInfoW
GetClipboardFormatNameA
MonitorFromRect
GetScrollRange
CreateWindowExA
DefWindowProcW
DrawFrame
DrawIconEx
RemovePropW
DestroyWindow
EqualRect
SetDebugErrorLevel
FrameRect
GetWindowThreadProcessId
CallMsgFilterW
DialogBoxParamW
InSendMessage
AppendMenuA
TrackPopupMenuEx
IsCharLowerW
EnumDesktopsA
GetCursorInfo
IsCharAlphaW
EndPaint
DlgDirSelectExW
DlgDirSelectComboBoxExA
IsDialogMessage
EnumPropsExA
DlgDirSelectComboBoxExW
CharLowerBuffW
RegisterWindowMessageW
RegisterClassA
ArrangeIconicWindows
ShowWindow
GetMenu
IsWindowVisible
CharLowerA
ExitWindowsEx
CharUpperW
RegisterClassExA
SetMenuContextHelpId
GetCursorPos
Sections
.text Size: 168KB - Virtual size: 167KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 412KB - Virtual size: 409KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 132KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ