Static task
static1
Behavioral task
behavioral1
Sample
b76e451a3c3753f138a967acd222136b35d0815b6e123a7e6c3f8e69f0c08d8e.exe
Resource
win7-20221111-en
General
-
Target
b76e451a3c3753f138a967acd222136b35d0815b6e123a7e6c3f8e69f0c08d8e
-
Size
149KB
-
MD5
c7109b48437bbe9d7b16c7f6b17c41e1
-
SHA1
5b944c29cf6c590686faf3a2d77f9280e4fed370
-
SHA256
b76e451a3c3753f138a967acd222136b35d0815b6e123a7e6c3f8e69f0c08d8e
-
SHA512
2f5ea9aef7ff89a4a59b28b070e84e78083a2f0ca58bdc1afa2193da7733e90d983b669a3b1a90c6b6a642f0df755661afc1d36bcf358bab4e441effa47a6596
-
SSDEEP
3072:b84AgwkfeXzbvvoPPguckD/49Cq1W7T+Mu8RCvaiFkRvOYnlZ:xwEWP4PPg/UATQZF6
Malware Config
Signatures
Files
-
b76e451a3c3753f138a967acd222136b35d0815b6e123a7e6c3f8e69f0c08d8e.exe windows x86
cb2f54bd6f3c4b2e1669e2bd24537e1c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GetCommandLineW
GetCurrentThread
GetLastError
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetVersion
HeapAlloc
HeapFree
InterlockedExchange
FreeLibrary
LocalAlloc
LocalFree
MultiByteToWideChar
RaiseException
SetCurrentDirectoryA
SetErrorMode
SetThreadPriority
lstrcatA
lstrcpyA
lstrlenA
lstrlenW
VirtualAlloc
FormatMessageA
ExitProcess
CreateMutexA
CompareStringA
LoadLibraryA
CloseHandle
user32
IsIconic
IsWindowVisible
MessageBoxA
SendMessageTimeoutA
SetForegroundWindow
ShowWindow
LoadIconA
LoadCursorA
LoadCursorW
LoadIconW
GetWindow
GetParent
GetDesktopWindow
GetClassNameA
FindWindowA
GetWindowThreadProcessId
gdi32
GetStockObject
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
Sections
.text Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ