Static task
static1
Behavioral task
behavioral1
Sample
b2b0306068626444b5d6b25bccd9c863cefcab003de66336c0ad4881d455d787.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b2b0306068626444b5d6b25bccd9c863cefcab003de66336c0ad4881d455d787.exe
Resource
win10v2004-20220812-en
General
-
Target
b2b0306068626444b5d6b25bccd9c863cefcab003de66336c0ad4881d455d787
-
Size
186KB
-
MD5
c16925d81364461f295b39d1f51fc64a
-
SHA1
0f65f4388367f7d07d8af1f46d89dfe07b177e75
-
SHA256
b2b0306068626444b5d6b25bccd9c863cefcab003de66336c0ad4881d455d787
-
SHA512
9d3e8640c97d1f4df752c9764cdde1d19086b805dcd58d82ef73fffeb36d10eca8421b5ae9b8c6fd8fd2b68994902a8b7912bd7a921a305d1d00c306b201b82f
-
SSDEEP
3072:Mji/mPFiVu6JSQAnxVAm9U8WSDK5tvvTOd501zFRnndVtNhdiFA56yTqOb:MjPFinEQAn3MkDK5tvv25oRnd9hQ6lxb
Malware Config
Signatures
Files
-
b2b0306068626444b5d6b25bccd9c863cefcab003de66336c0ad4881d455d787.exe windows x86
83476adfb598de6634a71231c6904324
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
rpcrt4
RpcStringBindingComposeW
RpcStringFreeW
RpcSmDestroyClientContext
RpcBindingFromStringBindingW
shell32
SHGetFolderPathW
DragQueryFileW
DragFinish
CommandLineToArgvW
SHFileOperationW
user32
IsWindow
PostQuitMessage
SendDlgItemMessageA
ReleaseDC
GetSystemMetrics
EndPaint
GetSubMenu
SetWindowRgn
GetMenuState
GetDlgCtrlID
EndDialog
IsIconic
TranslateMessage
UpdateWindow
GetWindowRect
CopyRect
DestroyMenu
GetSysColorBrush
GetMessageTime
EnableMenuItem
GetDesktopWindow
GetMenuItemID
GetDlgItem
SetWindowPos
ValidateRect
GetFocus
GetWindowPlacement
GetCapture
EnumWindowStationsA
GetMenuItemCount
ClientToScreen
MapWindowPoints
GetLastActivePopup
SetActiveWindow
SetCursor
GetMenu
GetClientRect
IsWindowVisible
GetActiveWindow
CheckMenuItem
IsWindowEnabled
GetMessagePos
SetForegroundWindow
SetFocus
ShowWindow
GetDC
DestroyWindow
PtInRect
SetMenuItemBitmaps
GetForegroundWindow
GetWindow
MoveWindow
BeginPaint
GetNextDlgTabItem
CallNextHookEx
GetParent
GetTopWindow
MapDialogRect
SystemParametersInfoA
GetCursorPos
ScreenToClient
UnhookWindowsHookEx
GetMenuCheckMarkDimensions
AdjustWindowRectEx
GetSysColor
GetKeyState
gdi32
DeleteObject
DeleteDC
SetBkColor
CreateCompatibleBitmap
DPtoLP
CombineRgn
RestoreDC
CreateCompatibleDC
GetPixel
GetDeviceCaps
SelectObject
CreateBitmap
GetClipBox
BitBlt
SaveDC
SetViewportExtEx
OffsetViewportOrgEx
CreateRectRgn
SetTextColor
PtVisible
GetStockObject
ScaleWindowExtEx
SetBkMode
ScaleViewportExtEx
Escape
RectVisible
SetViewportOrgEx
SetWindowExtEx
SetMapMode
kernel32
GetTempPathA
EnterCriticalSection
GlobalAlloc
ResetWriteWatch
GetCommandLineA
MulDiv
GlobalUnlock
WriteFile
lstrlenA
InitializeCriticalSection
GetSystemInfo
GlobalLock
VirtualAlloc
SetUnhandledExceptionFilter
DeleteCriticalSection
GetStringTypeA
SetErrorMode
CreateMailslotW
FreeLibrary
LoadLibraryA
IsBadCodePtr
UnhandledExceptionFilter
GetEnvironmentStrings
GlobalFlags
GetWindowsDirectoryA
VirtualQuery
SetHandleCount
LCMapStringA
GetModuleHandleA
GetTickCount
InterlockedExchange
LocalFree
InterlockedDecrement
LocalAlloc
GetThreadPriority
GetCurrentThreadId
LockResource
GetVersion
CloseHandle
FlushFileBuffers
GetSystemDirectoryA
GetCurrentProcessId
IsBadReadPtr
GetVersionExA
GetFileType
TerminateProcess
GlobalFree
GetStartupInfoA
QueryPerformanceCounter
LocalReAlloc
IsBadWritePtr
InterlockedIncrement
GlobalHandle
GetExitCodeProcess
GetThreadLocale
HeapCreate
GetSystemTimeAsFileTime
GetLocaleInfoA
HeapSize
SizeofResource
TlsAlloc
ExitProcess
SetFilePointer
GetACP
GetCurrentThread
GetOEMCP
TlsFree
VirtualFree
TlsGetValue
SetStdHandle
HeapAlloc
ReadFile
VirtualProtect
RtlUnwind
RaiseException
EnumResourceLanguagesW
TlsSetValue
CompareStringA
HeapDestroy
GetLastError
HeapReAlloc
FreeResource
GlobalDeleteAtom
ConvertDefaultLocale
HeapFree
LeaveCriticalSection
GetStdHandle
FreeEnvironmentStringsA
LoadResource
GetModuleFileNameA
GetCurrentProcess
SetLastError
oleaut32
VariantInit
DispGetIDsOfNames
VarUI4FromDec
SysFreeString
Sections
.text Size: 113KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 66KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 292B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ