Static task
static1
Behavioral task
behavioral1
Sample
b0cb96707877a631188fd2a5fba7279ae1d6751acaa196a9c6c31299df99ba0c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b0cb96707877a631188fd2a5fba7279ae1d6751acaa196a9c6c31299df99ba0c.exe
Resource
win10v2004-20220812-en
General
-
Target
b0cb96707877a631188fd2a5fba7279ae1d6751acaa196a9c6c31299df99ba0c
-
Size
520KB
-
MD5
d9fc69165ddae2058a93f3f6d0f7e3a3
-
SHA1
24c3521f868e8e46e935ae98cf0a8a94c0363c7f
-
SHA256
b0cb96707877a631188fd2a5fba7279ae1d6751acaa196a9c6c31299df99ba0c
-
SHA512
599bd62d7e89e3dcc8b64b6b2ba5549331a314d9e6682487cbb31d91dc7bb8f3425d62ae72dd581f53aed7a37bf0ebb92da328f4398300796a15a36c36d86d47
-
SSDEEP
6144:KEI2n5lgOmWfY4lAOCvnBQdobEhFfUIiXAz1N2q+8AoDyFHFGMVpWoE5ozwsJDXA:pkOnY4luBChaQ1N2+AHFH0MfzOmtmxQQ
Malware Config
Signatures
Files
-
b0cb96707877a631188fd2a5fba7279ae1d6751acaa196a9c6c31299df99ba0c.exe windows x86
b0d9a7339e15b7c9cf69d333a4ae900b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
ImageList_Create
ImageList_Destroy
ImageList_GetImageCount
ImageList_Add
ImageList_ReplaceIcon
ImageList_SetBkColor
ImageList_GetBkColor
ImageList_Draw
ImageList_DrawEx
ImageList_Remove
ImageList_BeginDrag
ImageList_EndDrag
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_SetDragCursorImage
ImageList_DragShowNolock
ImageList_GetDragImage
ImageList_Read
ImageList_Write
ImageList_GetIconSize
ImageList_SetIconSize
kernel32
GetProfileStringW
GetDefaultCommConfigA
DeleteVolumeMountPointA
FreeEnvironmentStringsA
ExpandEnvironmentStringsA
GetLongPathNameW
lstrcatA
CopyFileA
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
SetFilePointer
MulDiv
ReadFile
WriteFile
GetPrivateProfileStringA
WritePrivateProfileStringA
MultiByteToWideChar
FreeLibrary
GetProcAddress
LoadLibraryA
GetModuleHandleA
SetErrorMode
GetExitCodeProcess
WaitForSingleObject
GlobalAlloc
GlobalFree
GetEnvironmentVariableA
lstrcmpA
GetSystemDirectoryA
lstrlenA
GetTempFileNameA
CreateFileA
RemoveDirectoryA
CreateProcessA
CreateThread
GlobalLock
GlobalUnlock
GetDiskFreeSpaceA
lstrcpynA
GetTempPathA
GetWindowsDirectoryA
GetCommandLineA
ExitProcess
lstrcmpiA
GetCurrentProcess
GetTickCount
GetModuleFileNameA
GetFileSize
Sleep
SetFileAttributesA
CreateDirectoryA
GetLastError
GetFileAttributesA
SetCurrentDirectoryA
MoveFileA
GetFullPathNameA
GetShortPathNameA
SearchPathA
CompareFileTime
SetFileTime
CloseHandle
VirtualAlloc
InterlockedIncrement
InterlockedDecrement
GetSystemTimeAsFileTime
GetStartupInfoA
GetCPInfo
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
HeapAlloc
GetStdHandle
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
LCMapStringA
LCMapStringW
HeapReAlloc
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetLocaleInfoW
HeapSize
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RaiseException
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
Sections
.text Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 178KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 359KB - Virtual size: 358KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ