Static task
static1
Behavioral task
behavioral1
Sample
0b02073a4ec48ed56ee3c7df8e1d723661b814050c02f48a12280e4b839248f3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0b02073a4ec48ed56ee3c7df8e1d723661b814050c02f48a12280e4b839248f3.exe
Resource
win10v2004-20221111-en
General
-
Target
0b02073a4ec48ed56ee3c7df8e1d723661b814050c02f48a12280e4b839248f3
-
Size
154KB
-
MD5
58c016c0b2764a7b1991465a33f053da
-
SHA1
ed8529a3e61a1b561d47c8d1e9e372749af03477
-
SHA256
0b02073a4ec48ed56ee3c7df8e1d723661b814050c02f48a12280e4b839248f3
-
SHA512
0a810508e8a5e21ddb80b5a608e17364b766e59ee25252a512b703fcb1114dc13710f79a0fa178d4fa3e75e48ef53551da7817f2f27e95547f2342cf01e7e47f
-
SSDEEP
3072:Nj3KGMurWzctUaLoWVzeafvEL6/9c3PUJkh0JAD8DgjE:ND5WUo0fvoF8Jkh0iwDg
Malware Config
Signatures
Files
-
0b02073a4ec48ed56ee3c7df8e1d723661b814050c02f48a12280e4b839248f3.exe windows x86
de267c64ee97cf08627d1dd9512a50b5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQueryEx
MultiByteToWideChar
GlobalAlloc
RtlUnwind
RaiseException
CloseHandle
GetModuleFileNameW
SetFileAttributesA
LoadLibraryW
GetTempPathA
WriteFile
OutputDebugStringA
lstrlenW
GetDiskFreeSpaceA
CreateMutexA
TerminateThread
GetCPInfo
GetExitCodeThread
FileTimeToSystemTime
GetDateFormatA
GetModuleHandleA
InitializeCriticalSection
lstrlenA
CreateFileMappingW
LoadLibraryExA
UnmapViewOfFile
ReleaseMutex
GetTempFileNameA
MapViewOfFile
VirtualProtect
GlobalLock
GetTempPathA
SleepEx
TerminateProcess
GetCommandLineA
CreateThread
IsValidLocale
GetUserDefaultLCID
WaitForMultipleObjects
GlobalAlloc
GetCurrentThreadId
GetFileAttributesW
user32
CallWindowProcA
GetCursorPos
DestroyIcon
ShowWindow
GetMenuStringW
GetKeyboardState
MapVirtualKeyA
BeginPaint
GetDCEx
GetWindowLongW
InvalidateRect
ReleaseCapture
GetKeyState
SetFocus
DrawTextA
DrawIcon
EnableWindow
SetWindowTextW
PostQuitMessage
DeleteMenu
SetMenuItemInfoW
MapWindowPoints
GetLastActivePopup
GetUpdateRect
GetWindowRect
GetMenuItemInfoW
GetWindowTextLengthW
RemovePropA
GetSysColor
ValidateRect
GetWindowTextA
GetClassNameW
GetCaretPos
SendDlgItemMessageA
DestroyCursor
DispatchMessageW
CheckMenuItem
EnableMenuItem
BringWindowToTop
LockWindowUpdate
SetActiveWindow
MoveWindow
KillTimer
InflateRect
SetTimer
UnhookWindowsHookEx
SetForegroundWindow
GetMessageTime
gdi32
EndDoc
GdiFlush
Polygon
ExtTextOutA
GetDIBits
SetBrushOrgEx
SetWindowExtEx
CopyEnhMetaFileA
GetNearestPaletteIndex
CreatePalette
SetPixelV
RestoreDC
ExtCreatePen
StartDocA
GetPaletteEntries
GetFontLanguageInfo
SetBkColor
GetTextExtentPoint32W
CreateDIBitmap
CreateEnhMetaFileA
comctl32
ImageList_LoadImageA
ImageList_DragShowNolock
ImageList_DrawEx
ImageList_GetIcon
ImageList_DragLeave
ImageList_EndDrag
ImageList_Destroy
oleaut32
VariantClear
GetActiveObject
VariantChangeType
SafeArrayAccessData
shell32
DragFinish
SHGetSpecialFolderPathA
filert40
_LDtest
_LSnan
_FCosh
_LCosh
_LInf
_Mbrtowc
_Getcvt
_Nan
_Getcoll
wininet
InternetGoOnline
FtpOpenFileA
winmm
PlaySoundA
ole32
StringFromCLSID
CoCreateGuid
OleSetMenuDescriptor
OleGetClipboard
CoCreateInstance
OleSetClipboard
Sections
.text Size: 145KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ