Static task
static1
Behavioral task
behavioral1
Sample
b574d1692800b019411c398a768d65207c10367b3c41bfd8f929fe6d5762b024.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b574d1692800b019411c398a768d65207c10367b3c41bfd8f929fe6d5762b024.exe
Resource
win10v2004-20220812-en
General
-
Target
b574d1692800b019411c398a768d65207c10367b3c41bfd8f929fe6d5762b024
-
Size
44KB
-
MD5
01d9adbb262f6f42036e148312d389a0
-
SHA1
4493662084a69072b25566b09ff1014af07eeebb
-
SHA256
b574d1692800b019411c398a768d65207c10367b3c41bfd8f929fe6d5762b024
-
SHA512
0ce58efc8804389c2f525d6ea86f918081c32a3eacd08e5858879b8425151cb75b6432841d5ef8eeb87d82e183003450adfa3297756281ad767ffcee87d14610
-
SSDEEP
768:YGt5uFfOiaHP/CFIAwuQ1NY0ZuN7yp87P9Pg/A9t:YtNcCbwuWkJrP6O
Malware Config
Signatures
Files
-
b574d1692800b019411c398a768d65207c10367b3c41bfd8f929fe6d5762b024.exe windows x86
9618928141355d2afe388d9494656830
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
VirtualProtect
FindResourceExA
SetTapeParameters
GetComputerNameA
GetProcessTimes
GetThreadPriorityBoost
CreateConsoleScreenBuffer
ReadConsoleInputExW
ReadConsoleOutputCharacterW
GetTempPathW
GetConsoleWindow
DefineDosDeviceA
GlobalReAlloc
Heap32Next
CreateTimerQueue
SetupComm
EndUpdateResourceA
DeleteVolumeMountPointW
DeleteFileW
SetConsoleCursor
GetShortPathNameW
LocalHandle
EnumCalendarInfoW
ReadProcessMemory
GetConsoleDisplayMode
DeleteTimerQueueTimer
CreateSemaphoreW
EnumTimeFormatsW
GetCurrencyFormatA
AddAtomW
SetConsoleDisplayMode
CompareStringW
FindResourceA
EnumSystemCodePagesW
CancelIo
PostQueuedCompletionStatus
FlushConsoleInputBuffer
RegisterWaitForInputIdle
CreateTapePartition
user32
LoadBitmapA
OpenDesktopW
MapVirtualKeyExA
GetGUIThreadInfo
DefMDIChildProcA
CharLowerW
MessageBoxExA
SetMenuItemInfoA
GetMenuStringW
IsRectEmpty
CreateIconFromResource
LookupIconIdFromDirectory
EnumDesktopWindows
DdeFreeDataHandle
InvertRect
EnumChildWindows
ValidateRect
GetCursor
DestroyCaret
RegisterShellHookWindow
DdeQueryStringW
ClientThreadSetup
GetDlgItemInt
DdePostAdvise
ScrollDC
SetClipboardData
wvsprintfA
MapVirtualKeyExW
LoadStringW
ShowWindowAsync
TranslateAcceleratorA
SetDlgItemInt
LoadCursorFromFileA
IsClipboardFormatAvailable
TabbedTextOutA
InflateRect
EndDeferWindowPos
LoadKeyboardLayoutEx
SetMessageExtraInfo
LoadAcceleratorsW
ToAscii
gdi32
GetMetaFileBitsEx
SetLayoutWidth
RemoveFontResourceExW
ResetDCA
GetSystemPaletteUse
EngUnlockSurface
EndPath
CreateEllipticRgnIndirect
GdiCleanCacheDC
AddFontResourceW
CreateRectRgn
DPtoLP
EngGetDriverName
GetCharWidth32A
ModifyWorldTransform
GetRgnBox
DrawEscape
GdiConvertFont
GetPath
EnumICMProfilesA
GdiProcessSetup
SetColorAdjustment
PlayMetaFile
BRUSHOBJ_ulGetBrushColor
GdiConvertAndCheckDC
CLIPOBJ_bEnum
GetEUDCTimeStamp
FrameRgn
GdiEntry14
GetEnhMetaFileHeader
GdiConvertBrush
CreateDIBPatternBrush
GetStringBitmapA
StretchDIBits
CreateFontA
Chord
GetICMProfileW
EudcLoadLinkW
CopyEnhMetaFileW
CreateCompatibleDC
GdiTransparentBlt
SelectPalette
GetTextCharset
GetRasterizerCaps
comdlg32
PrintDlgExW
Ssync_ANSI_UNICODE_Struct_For_WOW
FindTextW
CommDlgExtendedError
dwLBSubclass
GetSaveFileNameW
GetOpenFileNameW
psapi
QueryWorkingSet
GetMappedFileNameW
GetDeviceDriverBaseNameA
GetMappedFileNameA
GetDeviceDriverFileNameW
GetDeviceDriverFileNameA
EnumProcessModules
InitializeProcessForWsWatch
GetModuleInformation
GetProcessMemoryInfo
EnumProcesses
GetDeviceDriverBaseNameW
GetWsChanges
EnumDeviceDrivers
GetModuleFileNameExA
GetModuleBaseNameW
EmptyWorkingSet
GetModuleFileNameExW
comctl32
ImageList_BeginDrag
ImageList_DragEnter
ImageList_Create
DestroyPropertySheetPage
InitializeFlatSB
InitCommonControlsEx
ImageList_DrawIndirect
ImageList_GetDragImage
PropertySheetW
ImageList_Write
CreateStatusWindow
CreateMappedBitmap
CreateToolbarEx
Sections
.text Size: 4KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE