Static task
static1
Behavioral task
behavioral1
Sample
b633899ded13c49d1c122f91b80c317d46bd9f100e6048aeb3510d2a8e1b64ba.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b633899ded13c49d1c122f91b80c317d46bd9f100e6048aeb3510d2a8e1b64ba.exe
Resource
win10v2004-20221111-en
General
-
Target
b633899ded13c49d1c122f91b80c317d46bd9f100e6048aeb3510d2a8e1b64ba
-
Size
710KB
-
MD5
7df0b2ff40285bc70cd2ae3b4935ba73
-
SHA1
21079c7af17e47d1a2d5887939ae4c26d28b280a
-
SHA256
b633899ded13c49d1c122f91b80c317d46bd9f100e6048aeb3510d2a8e1b64ba
-
SHA512
e9ac662361d2c861a07ed9ce77a22f9b00115611657a10cf5c22689554bf83402b4963637e811b6bbac69a4bb543c4459558c991e9db3a8047f20250c9d2c969
-
SSDEEP
12288:wfKcPm/4SCrAZ4Qz0uQSf23mlYzeH3LiteeN67uJTHLdEStAvzTaMJyDh0xhA:wfKcNrAZhzXvH7iteeU7YrdrtgzTaMJM
Malware Config
Signatures
Files
-
b633899ded13c49d1c122f91b80c317d46bd9f100e6048aeb3510d2a8e1b64ba.exe windows x86
bccbdcfd22276acf22fe308f7326d80f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDriveStringsA
IsBadCodePtr
GetComputerNameExW
GetAtomNameW
GlobalAddAtomA
CreateSemaphoreW
ConnectNamedPipe
FindClose
SetVolumeLabelA
CreateTimerQueueTimer
_lread
MoveFileExA
GetThreadTimes
FindNextVolumeMountPointW
DuplicateHandle
MapViewOfFile
GetDiskFreeSpaceW
SetFilePointer
lstrcmpW
UnhandledExceptionFilter
FreeUserPhysicalPages
GetShortPathNameW
SetWaitableTimer
GetFileSizeEx
GetPrivateProfileSectionNamesW
DeleteTimerQueue
FreeEnvironmentStringsW
CreateFileMappingW
SuspendThread
SetSystemTime
CancelWaitableTimer
EscapeCommFunction
EnumUILanguagesA
SetEnvironmentVariableA
WideCharToMultiByte
ChangeTimerQueueTimer
GetCalendarInfoW
LCMapStringA
FindAtomW
GetCurrentThreadId
GetCommMask
_lclose
SetFileAttributesA
FindFirstFileA
GetSystemTimeAdjustment
FindResourceExA
_lwrite
DefineDosDeviceA
BackupSeek
lstrcpynW
SetTapeParameters
IsValidCodePage
GetStringTypeExA
LocalFlags
SetFileAttributesW
IsBadWritePtr
GlobalFree
EnumResourceLanguagesA
GetSystemTime
RemoveDirectoryW
IsValidLanguageGroup
GetVolumeInformationA
EnumResourceNamesW
SetDefaultCommConfigW
IsValidLocale
FindNextVolumeA
lstrcpyW
lstrcpynA
InterlockedIncrement
MoveFileExW
WritePrivateProfileStructA
SetCurrentDirectoryW
GetSystemWindowsDirectoryW
GetFileAttributesW
CreateEventW
GetSystemPowerStatus
IsBadStringPtrA
WritePrivateProfileStringA
SetSystemPowerState
EnumTimeFormatsW
CreateWaitableTimerA
GetCommModemStatus
GetPrivateProfileSectionW
GetCPInfoExW
SetMailslotInfo
GetShortPathNameA
ConvertDefaultLocale
GetPrivateProfileIntW
GetPrivateProfileStringW
GetExitCodeThread
GetWindowsDirectoryW
GetNamedPipeHandleStateW
FatalAppExitA
SetLocaleInfoA
LocalAlloc
GetProcessPriorityBoost
WritePrivateProfileStructW
UpdateResourceA
GetDateFormatW
GlobalGetAtomNameW
QueryPerformanceCounter
UnmapViewOfFile
InterlockedDecrement
GetProfileIntW
GetCPInfo
GetFileTime
GetFileAttributesA
GetDevicePowerState
GetCalendarInfoA
EndUpdateResourceW
GetAtomNameA
shlwapi
PathAppendA
user32
DialogBoxIndirectParamW
DrawAnimatedRects
SetMenuItemInfoA
SetDlgItemTextW
MessageBoxExA
SetActiveWindow
UpdateWindow
CharLowerBuffA
SendMessageCallbackW
RegisterDeviceNotificationW
EnumChildWindows
GetWindowLongA
SetParent
FillRect
MapDialogRect
DlgDirListW
SetThreadDesktop
TrackMouseEvent
GetDesktopWindow
SetWindowContextHelpId
DestroyWindow
GetMenuBarInfo
GetDialogBaseUnits
SetDebugErrorLevel
LoadMenuA
DdeClientTransaction
Sections
.text Size: 227KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 273KB - Virtual size: 656KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 205KB - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ