Static task
static1
Behavioral task
behavioral1
Sample
b293204e3b04707cb67984bbd5fe504761155bffd2e865433b6ad8409d9161c3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b293204e3b04707cb67984bbd5fe504761155bffd2e865433b6ad8409d9161c3.exe
Resource
win10v2004-20221111-en
General
-
Target
b293204e3b04707cb67984bbd5fe504761155bffd2e865433b6ad8409d9161c3
-
Size
306KB
-
MD5
8105d0a3dd2a66e20d828f567b5a9569
-
SHA1
64892a946dcc960c387e3b4d074989cf4ad153e9
-
SHA256
b293204e3b04707cb67984bbd5fe504761155bffd2e865433b6ad8409d9161c3
-
SHA512
9970e523356afdd2e84f32e1b77d4e4d93c0429ada31ad40fd3524e3356bfb958d88cfc919d1ae26e644cda8c6abc636caec1c7d6082b8b2ba1431c7d2eb4051
-
SSDEEP
6144:IXHEcDthb4m21lyhsOiFD1FS5+w0lwGGc:IXbhz2YI1uklwlc
Malware Config
Signatures
Files
-
b293204e3b04707cb67984bbd5fe504761155bffd2e865433b6ad8409d9161c3.exe windows x86
0f8d5d01c654132fe82e073441f2219a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathIsFileSpecW
PathAddExtensionW
PathMatchSpecW
PathIsDirectoryW
PathUnquoteSpacesW
PathStripPathW
PathRemoveBackslashW
PathFileExistsW
PathFindExtensionW
PathAppendW
SHRegGetValueW
PathRemoveFileSpecW
mfc90u
ord6411
ord1493
ord4652
ord5664
ord3286
ord3489
ord797
ord595
ord1937
ord6579
ord6275
ord6311
ord6760
ord2364
ord2904
ord2592
ord2593
ord6065
ord4543
ord1486
ord2283
ord1719
ord4660
ord3654
ord778
ord553
ord757
ord6513
ord4774
ord2069
ord5893
ord2597
ord4978
ord6169
ord3630
ord2278
ord1770
ord1682
ord4656
ord3547
ord677
ord4044
ord3528
ord654
ord3665
ord791
ord4040
ord6636
ord6746
ord1364
ord2154
ord4171
ord6349
ord4771
ord3741
ord5322
ord4400
ord1144
ord596
ord798
ord6514
ord6173
ord938
ord935
ord4934
ord1488
ord6791
ord2105
ord1602
ord4508
ord2275
ord1666
ord4653
ord959
ord2614
ord2637
ord2632
ord3234
ord3492
ord692
ord2038
ord2045
ord1938
ord1256
ord6203
ord2725
ord2360
ord2057
ord1383
ord2372
ord3146
ord4512
ord2282
ord3577
ord2130
ord1357
ord2596
ord6666
ord4262
ord4266
ord6347
ord3155
ord6353
ord3145
ord4167
ord1779
ord1708
ord3627
ord750
ord4442
ord2326
ord6170
ord406
ord960
ord2490
ord2501
ord4322
ord3018
ord3015
ord1553
ord4251
ord320
ord1261
ord933
ord1249
ord1182
ord285
ord1607
ord2478
ord2081
ord899
ord3819
ord4007
ord415
ord670
ord576
ord779
ord4720
ord5615
ord1116
ord1220
ord1222
ord6575
ord6338
ord3156
ord585
ord4451
ord1585
ord6197
ord2340
ord2341
ord5803
ord4685
ord5363
ord3355
ord6424
ord6426
ord4670
ord4127
ord4763
ord3225
ord6375
ord4697
ord1380
ord2369
ord5655
ord5598
ord4344
ord1681
ord4429
ord2650
ord2651
ord3287
ord980
ord6381
ord3230
ord6379
ord3229
ord5338
ord3232
ord4553
ord4730
ord5450
ord5447
ord2860
ord2079
ord2445
ord5354
ord4985
ord2595
ord3167
ord814
ord4270
ord4518
ord4490
ord4494
ord2504
ord2479
ord4235
ord1250
ord266
ord2727
ord405
ord664
ord3360
ord2209
ord3399
ord3012
ord2280
ord4658
ord3563
ord693
ord4010
ord3061
ord6355
ord265
ord3370
ord3165
ord531
ord2222
ord1871
ord4630
ord5166
ord3236
ord3498
ord3537
ord2106
ord3543
ord1354
ord6545
ord4541
ord4410
ord2097
ord939
ord524
ord744
ord3674
ord965
ord969
ord967
ord971
ord2615
ord2635
ord2619
ord2625
ord2623
ord2621
ord2638
ord2633
ord2617
ord2640
ord2628
ord2610
ord2612
ord2630
ord2375
ord2368
ord1641
ord6802
ord4174
ord6804
ord3682
ord5404
ord6376
ord3226
ord1442
ord5625
ord1792
ord1791
ord1727
ord5650
ord3140
ord4910
ord4682
ord3515
ord4448
ord4423
ord6801
ord4747
ord2251
ord2206
ord6035
ord4179
ord1048
ord5548
ord6741
ord5830
ord4213
ord2087
ord5674
ord5676
ord4347
ord4996
ord5680
ord6018
ord2771
ord2983
ord3112
ord4728
ord2966
ord3115
ord2774
ord2893
ord2764
ord4080
ord4081
ord4071
ord2891
ord4348
ord4905
ord4681
ord3670
ord1665
ord2274
ord611
ord1603
ord6699
ord6693
ord4405
ord293
ord3220
ord1599
ord5632
ord4631
ord5167
ord5324
ord1810
ord1809
ord1675
ord3353
ord6408
ord1754
ord1751
ord4345
ord1492
ord4664
ord5602
ord2074
ord5512
ord6800
ord4603
ord5653
ord3743
ord5154
ord4702
ord1728
ord6466
ord5685
ord3381
ord5683
ord4160
ord4173
ord290
ord782
ord580
ord5663
ord1063
ord1088
ord1688
ord436
ord2208
ord1108
ord5008
ord4000
ord639
ord374
ord2447
ord2139
ord6604
ord1137
ord1183
ord2537
ord1098
ord794
ord589
ord1272
ord801
ord600
ord4043
ord799
ord5851
ord296
ord1248
ord286
ord3217
ord280
ord813
ord2694
ord811
ord665
msvcr90
_lock
__dllonexit
_unlock
__set_app_type
_encode_pointer
__p__fmode
__p__commode
__CxxFrameHandler3
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_wcmdln
exit
_XcptFilter
_CxxThrowException
memset
_exit
_cexit
__wgetmainargs
_amsg_exit
_wcsicmp
wcscpy_s
_wmakepath_s
_wsplitpath_s
_wfullpath
_wtof
_wtoi
swscanf_s
_wcsdup
_onexit
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
?terminate@@YAXXZ
_decode_pointer
free
kernel32
GetLocaleInfoW
MulDiv
ExpandEnvironmentStringsA
LoadLibraryA
InterlockedExchange
Sleep
InterlockedCompareExchange
GetStartupInfoW
GetVersionExW
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
InterlockedDecrement
HeapFree
GetProcessHeap
GlobalUnlock
GlobalLock
GlobalAlloc
CreateDirectoryW
LocalFree
FormatMessageW
lstrlenW
SetUnhandledExceptionFilter
GetProcAddress
GetModuleHandleW
SetLastError
lstrcpyW
FreeLibrary
GetLastError
LoadLibraryW
QueryPerformanceCounter
IsDebuggerPresent
GetModuleFileNameW
user32
CheckMenuItem
GetClassInfoW
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
RemoveMenu
GetSubMenu
LoadMenuW
GetFocus
GetWindowLongW
GetKeyState
PostMessageW
GetParent
ScreenToClient
GetCursorPos
GetClassNameW
GetSystemMetrics
GetClientRect
LoadImageW
OffsetRect
GetWindowRect
ReleaseDC
GetDC
EnableWindow
SetForegroundWindow
ShowOwnedPopups
IsIconic
PostQuitMessage
TranslateAcceleratorW
LoadIconW
UpdateWindow
LoadAcceleratorsW
RedrawWindow
SendMessageW
FindWindowW
DestroyIcon
LoadCursorW
gdi32
EndPage
StartPage
StartDocW
CreateFontIndirectW
GetObjectW
GetDeviceCaps
GetTextExtentPoint32W
EndDoc
GetTextMetricsW
advapi32
RegOpenKeyExW
RegOpenKeyExA
RegQueryValueExA
RegSetValueExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
shell32
SHGetPathFromIDListW
ExtractIconExW
SHGetSpecialFolderLocation
ShellExecuteW
SHGetMalloc
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
SafeArrayUnaccessData
VariantCopy
VariantClear
SysFreeString
SysAllocString
VariantInit
SafeArrayAccessData
VariantChangeType
Sections
.text Size: 126KB - Virtual size: 126KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 97KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE