Static task
static1
Behavioral task
behavioral1
Sample
b73518f4d0d5e0f3ac262335ae4715f4f54f91f623a6de74c2ef1326754b6c39.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b73518f4d0d5e0f3ac262335ae4715f4f54f91f623a6de74c2ef1326754b6c39.exe
Resource
win10v2004-20220901-en
General
-
Target
b73518f4d0d5e0f3ac262335ae4715f4f54f91f623a6de74c2ef1326754b6c39
-
Size
191KB
-
MD5
e6c81c0a935b723201e297f3cec55ae4
-
SHA1
dd21b3b803105d922d64cbeccbe9474d7d841cca
-
SHA256
b73518f4d0d5e0f3ac262335ae4715f4f54f91f623a6de74c2ef1326754b6c39
-
SHA512
c5cf01e63ae35bddd6b276f389c3de005f536e383feb38948e7bae72cac9fef37f52dd4eb5b05a87c9f98e399ad457eb78c898e4008da666d1b881e4826c92fc
-
SSDEEP
3072:epP3WXUQRkgydpjyGNf01DERN8fCob/gL1jJ+TcW8FB64pl4kiNWxnybz:gP3eYdriYaCaJcWaB66i8xnybz
Malware Config
Signatures
Files
-
b73518f4d0d5e0f3ac262335ae4715f4f54f91f623a6de74c2ef1326754b6c39.exe windows x86
8524af536195e3bea75f4125c093820d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetSysColor
KillTimer
DestroyIcon
DestroyWindow
PostQuitMessage
GetClientRect
MoveWindow
GetSystemMenu
SetTimer
SetWindowPlacement
InsertMenuItemA
GetMenu
CheckMenuItem
SetMenuItemInfoA
SetActiveWindow
DefDlgProcA
RegisterClassA
EndDialog
SetDlgItemTextA
EnumClipboardFormats
GetClipboardData
CloseClipboard
GetClassInfoA
CallWindowProcA
SetWindowLongA
IsDlgButtonChecked
SetWindowTextA
CheckDlgButton
GetActiveWindow
MessageBoxA
wsprintfA
GetDlgItemTextA
SendMessageA
GetCursorPos
TrackPopupMenu
ClientToScreen
DestroyMenu
CreatePopupMenu
AppendMenuA
SendDlgItemMessageA
GetDlgItem
LoadCursorA
gdi32
GetStockObject
DeleteObject
SetBkMode
SetTextColor
CreateFontIndirectA
SelectObject
GetObjectA
opengl32
glRasterPos3f
glTexParameterfv
glVertex4fv
glLighti
glRectdv
glSelectBuffer
kernel32
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
GetCurrentProcessId
QueryPerformanceCounter
DeleteCriticalSection
IsDebuggerPresent
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
IsValidCodePage
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
EnterCriticalSection
lstrcatA
HeapAlloc
GetProcessHeap
HeapFree
ExitThread
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetHandleCount
Sleep
CreateThread
VirtualAlloc
VirtualFree
GetProcAddress
OpenProcess
IsBadStringPtrA
DeleteVolumeMountPointA
CloseHandle
GetLongPathNameW
FillConsoleOutputAttribute
SuspendThread
EnumUILanguagesW
GetPriorityClass
GetVersion
lstrlenA
lstrcpyA
lstrcpynA
GetFileAttributesA
FindClose
FindFirstFileA
ReadFile
GetTempFileNameA
GetTickCount
GetTempPathA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
TerminateProcess
ResumeThread
OutputDebugStringA
ReadProcessMemory
GetCurrentDirectoryA
VirtualProtectEx
CreateProcessA
WriteFile
CreateFileA
GetModuleHandleA
lstrcmpiA
RtlUnwind
GetStartupInfoA
GetCommandLineA
MultiByteToWideChar
LCMapStringA
LCMapStringW
HeapSize
GetCPInfo
GetACP
GetOEMCP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
SetUnhandledExceptionFilter
IsBadWritePtr
IsBadCodePtr
GetStringTypeA
GetStringTypeW
SetStdHandle
WideCharToMultiByte
GetPrivateProfileStructA
WritePrivateProfileStructA
VirtualQueryEx
HeapReAlloc
FreeLibrary
LoadLibraryA
FindNextFileA
FileTimeToSystemTime
CopyFileA
SetFileAttributesA
LocalAlloc
TerminateThread
SetPriorityClass
GetCurrentProcess
GetLastError
WriteProcessMemory
SetCurrentDirectoryA
GetLocalTime
DeleteFileA
ExitProcess
SetProcessShutdownParameters
LocalFree
SetEndOfFile
FlushViewOfFile
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
DeviceIoControl
FlushFileBuffers
GlobalReAlloc
GetSystemTimeAsFileTime
GlobalMemoryStatus
FileTimeToLocalFileTime
FileTimeToDosDateTime
GetFileSize
GetFileTime
GetSystemInfo
GetModuleFileNameA
SetFilePointer
VirtualQuery
lstrcmpA
IsBadReadPtr
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ