Static task
static1
Behavioral task
behavioral1
Sample
b4b0b4fea74a20e192856d7d5965d30578e4e6d77dab084cd3576a2db16c4901.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b4b0b4fea74a20e192856d7d5965d30578e4e6d77dab084cd3576a2db16c4901.exe
Resource
win10v2004-20221111-en
General
-
Target
b4b0b4fea74a20e192856d7d5965d30578e4e6d77dab084cd3576a2db16c4901
-
Size
34KB
-
MD5
9706a859a64bc37ee762ae83b51db049
-
SHA1
04e8d2e765a0bdffcc76ddb9bcc8f57d2e65e8c4
-
SHA256
b4b0b4fea74a20e192856d7d5965d30578e4e6d77dab084cd3576a2db16c4901
-
SHA512
9008b873811524a313baf2e5bc47d9d502f9efcf394240235f92bfd37f731f6b4706552335ec57c35711d5906713e8f468519663aa94af6128d74fe8e187fc85
-
SSDEEP
768:dphqSHj2IWSF1CO1IcZMQT/k3qXqvEftXp/f5+1F:dph3DHLjZMQT/k3XCtZ/f5OF
Malware Config
Signatures
Files
-
b4b0b4fea74a20e192856d7d5965d30578e4e6d77dab084cd3576a2db16c4901.exe windows x86
7854dfcfe0f20dc202768ef7c8eb8559
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
crtdll
memset
strlen
_strnicmp
strncmp
strncpy
strcpy
atof
strcat
localtime
mktime
gmtime
user32
wsprintfA
wvsprintfA
MessageBoxA
GetWindowThreadProcessId
IsWindowVisible
IsWindowEnabled
GetForegroundWindow
EnableWindow
EnumWindows
GetWindowLongA
CallWindowProcA
DefWindowProcA
SetWindowLongA
DestroyWindow
SetWindowTextA
SendMessageA
GetParent
CreateWindowExA
PostMessageA
LoadCursorA
LoadIconA
RegisterClassA
GetSysColor
AdjustWindowRect
GetSystemMetrics
GetActiveWindow
GetWindowRect
ShowWindow
PeekMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
GetClassNameA
GetWindow
SetWindowPos
SetFocus
SetActiveWindow
UnregisterClassA
DestroyAcceleratorTable
GetFocus
IsChild
EnumChildWindows
GetKeyState
CreateAcceleratorTableA
SetCursorPos
LoadImageA
SetCursor
SystemParametersInfoA
SetCapture
GetCursorPos
MapWindowPoints
ReleaseCapture
MoveWindow
wininet
InternetGetConnectedState
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
urlmon
URLDownloadToFileA
gdi32
GetStockObject
CreateBrushIndirect
advapi32
OpenSCManagerA
CreateServiceA
QueryServiceStatus
StartServiceA
CloseServiceHandle
RegOpenKeyExA
RegSetValueExA
RegCloseKey
OpenServiceA
ControlService
DeleteService
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
comctl32
InitCommonControls
kernel32
GetModuleHandleA
GetCommandLineA
ExitProcess
HeapCreate
GetSystemDirectoryA
GetModuleFileNameA
GetEnvironmentVariableA
GetCurrentDirectoryA
HeapDestroy
HeapReAlloc
FreeLibrary
GetProcAddress
HeapAlloc
LoadLibraryA
IsBadReadPtr
HeapFree
OutputDebugStringA
GetLastError
CreateEventA
WaitForSingleObject
CreateThread
CloseHandle
SetEvent
SuspendThread
ResumeThread
Sleep
GetCurrentThreadId
GetCurrentProcessId
GlobalFree
GlobalAlloc
GetTickCount
CreateFileA
ReadFile
SetFilePointer
GetFileSize
WriteFile
GetLocalTime
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteExA
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.flat Size: 1024B - Virtual size: 537B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE