Static task
static1
Behavioral task
behavioral1
Sample
b3bd7fdd35ff22530066b06ec000bf453ddb48fd4a901f1c8674be4d9dfb1b9f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b3bd7fdd35ff22530066b06ec000bf453ddb48fd4a901f1c8674be4d9dfb1b9f.exe
Resource
win10v2004-20221111-en
General
-
Target
b3bd7fdd35ff22530066b06ec000bf453ddb48fd4a901f1c8674be4d9dfb1b9f
-
Size
188KB
-
MD5
613c936cfba4b328a27dfbdccb4a88d0
-
SHA1
54c0767fd365b2162e6482ad38f6c315dda8afc6
-
SHA256
b3bd7fdd35ff22530066b06ec000bf453ddb48fd4a901f1c8674be4d9dfb1b9f
-
SHA512
c85d5b4390c9a3f381e43711f38d15f8edbcfb6013c3960ab2cac9b3fabbc6e6bbdebdbef64cb5a217810e1dca4e70fe5a1d0b79e839c066083d5aaf0645a310
-
SSDEEP
3072:IdWa9rEa5wM3uYfpEpWHoENqoKPlDkUI5L:f8B5HoG86b5L
Malware Config
Signatures
Files
-
b3bd7fdd35ff22530066b06ec000bf453ddb48fd4a901f1c8674be4d9dfb1b9f.exe windows x86
83e94316006dac82cc9734fc05b7fe49
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
CreatePropertySheetPageA
DestroyPropertySheetPage
kernel32
InitializeCriticalSection
GetProcAddress
LoadLibraryA
IsDBCSLeadByte
lstrcpyA
lstrcatA
WaitForMultipleObjects
CloseHandle
CreateEventA
WaitForSingleObject
LoadLibraryExA
lstrcpynA
CreateFileA
CopyFileA
GetSystemDirectoryA
GetVersionExA
GetModuleFileNameA
GetModuleHandleA
FindResourceA
LoadResource
SizeofResource
FreeLibrary
WideCharToMultiByte
GetSystemDefaultLCID
GetLocaleInfoA
CompareFileTime
HeapSize
FlushFileBuffers
SetStdHandle
ReadFile
SetFilePointer
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
WriteFile
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
LocalFree
GetCurrentProcess
TerminateProcess
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
ExitProcess
GetVersion
GetStartupInfoA
RaiseException
lstrlenA
MultiByteToWideChar
lstrlenW
HeapReAlloc
HeapFree
GetCommandLineA
GetCurrentThreadId
lstrcmpiA
CreateMutexA
GetLastError
CreateThread
GetShortPathNameA
InterlockedDecrement
InterlockedIncrement
HeapAlloc
RtlUnwind
user32
ChangeDisplaySettingsA
DefWindowProcA
DialogBoxParamA
KillTimer
DispatchMessageA
GetMessageA
PostMessageA
CreateWindowExA
RegisterClassA
CharNextA
EnableWindow
GetDlgCtrlID
EndDialog
GetDlgItem
SetWindowTextA
WinHelpA
LoadStringA
GetWindowRect
EnableMenuItem
GetSystemMenu
SetRectEmpty
EqualRect
SendMessageA
EnumChildWindows
PostQuitMessage
SetTimer
PeekMessageA
ChangeDisplaySettingsExA
EnumDisplaySettingsA
BroadcastSystemMessage
FindWindowA
SetWindowLongA
CallWindowProcA
wsprintfA
GetParent
advapi32
RegOpenKeyA
RegCreateKeyExA
RegDeleteValueA
RegEnumValueA
RegQueryInfoKeyA
RegQueryValueExA
RegEnumKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
ole32
CoRevokeClassObject
CoCreateInstance
CoRegisterClassObject
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoInitialize
CoUninitialize
oleaut32
VarUI4FromStr
SysFreeString
VariantClear
SysStringByteLen
SysStringLen
SysAllocString
SysAllocStringByteLen
RegisterTypeLi
SysAllocStringLen
LoadTypeLi
hccutils
LoadDialogString
GetCommonRegKey
FindResources
EnumDspDev
GetHardwareKey
ReleaseClassDevice
IsDisplayValid
EnumDeviceByClass
LoadSTRING
GetCurrentDisplay
Sections
.text Size: 84KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rtcyfmy Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sssjyjv Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE