Static task
static1
Behavioral task
behavioral1
Sample
b70f74bb05708afbeb980ba38f8120d68dda9a5ced707c03a38dcf5c85dfa876.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b70f74bb05708afbeb980ba38f8120d68dda9a5ced707c03a38dcf5c85dfa876.exe
Resource
win10v2004-20221111-en
General
-
Target
b70f74bb05708afbeb980ba38f8120d68dda9a5ced707c03a38dcf5c85dfa876
-
Size
166KB
-
MD5
c5c0567786c699c7592ba14d61f82184
-
SHA1
9655279a171c76315f6eb9a77ac22dbf89b7fe4c
-
SHA256
b70f74bb05708afbeb980ba38f8120d68dda9a5ced707c03a38dcf5c85dfa876
-
SHA512
a9584740f3960b6b9800f09f73e978a6430a8469d98c71c3780b4f85fc7d4160295d512de14286c1c7246e1f174dd722fd88b93a5a31e9358108d59f22f7b1de
-
SSDEEP
3072:tKPRzUaAq3W4OrYrzO/5tokUxrntCOy2oVvs1Mi:gPvW4OrYXOBtN8y2oVv
Malware Config
Signatures
Files
-
b70f74bb05708afbeb980ba38f8120d68dda9a5ced707c03a38dcf5c85dfa876.exe windows x86
e07b472bccf84157d74694777b15807a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
GetSystemDefaultLangID
GetCurrentThreadId
GetProcessHeap
VirtualAllocEx
CreateFileA
GetCurrentThread
SizeofResource
GetFileAttributesA
GetOEMCP
EnumCalendarInfoA
MoveFileA
MulDiv
SetThreadLocale
lstrlenA
GetACP
SetErrorMode
GetStringTypeA
LocalFree
HeapDestroy
GetCurrentProcess
FindClose
CloseHandle
CompareStringA
lstrcpynA
FreeLibrary
LoadLibraryA
GetFileType
lstrcpyA
GetFileSize
GetModuleFileNameA
LockResource
LoadLibraryExA
ExitThread
GlobalAlloc
GetDateFormatA
VirtualFree
GetVersionExA
GetProcAddress
HeapFree
LocalAlloc
FormatMessageA
CreateEventA
SetLastError
VirtualAlloc
WaitForSingleObject
GetCommandLineA
ResetEvent
GetUserDefaultLCID
GlobalAddAtomA
GetDiskFreeSpaceA
CreateThread
VirtualQuery
lstrcmpiA
SetEvent
SetFilePointer
SetHandleCount
GetStartupInfoA
GetFullPathNameA
lstrcmpA
GetLocaleInfoA
GetStringTypeW
DeleteFileA
GetModuleHandleA
LocalReAlloc
ReadFile
LoadResource
GetThreadLocale
EnterCriticalSection
FindResourceA
lstrcatA
GetLocalTime
GetCurrentProcessId
DeleteCriticalSection
GetLastError
FindFirstFileA
GlobalFindAtomA
GlobalDeleteAtom
GetStdHandle
GetEnvironmentStrings
Sleep
HeapAlloc
FreeResource
WriteFile
GetVersion
ExitProcess
user32
GetKeyState
MapVirtualKeyA
wsprintfA
GetMenuState
WaitMessage
RedrawWindow
FindWindowA
SetMenuItemInfoA
TranslateMDISysAccel
PostMessageA
ShowScrollBar
GetDesktopWindow
DeleteMenu
LoadIconA
SetFocus
OffsetRect
RegisterWindowMessageA
FillRect
GetWindowDC
IsWindowEnabled
GetMenu
IsIconic
CallWindowProcA
GetFocus
LoadBitmapA
GetKeyboardType
InsertMenuA
CharLowerBuffA
UpdateWindow
GetKeyboardLayout
GetSysColor
DispatchMessageW
GetMessagePos
SystemParametersInfoA
DestroyWindow
GetForegroundWindow
GetMenuStringA
IsWindowVisible
GetMenuItemCount
GetActiveWindow
GetDC
GetSysColorBrush
GetScrollInfo
ReleaseDC
RemovePropA
GetScrollPos
CallNextHookEx
GetSystemMenu
LoadKeyboardLayoutA
OemToCharA
IsZoomed
GetWindowPlacement
DrawIcon
SetTimer
EnumThreadWindows
GetWindowLongW
InsertMenuItemA
GetKeyboardState
SetCursor
SetClipboardData
GetCursorPos
EnableWindow
AdjustWindowRectEx
RegisterClassA
GetWindowTextA
DrawEdge
FrameRect
SetCapture
GetWindowThreadProcessId
CharNextA
DefMDIChildProcA
ChildWindowFromPoint
IntersectRect
IsWindowUnicode
GetWindowRect
GetClientRect
LoadCursorA
SendMessageA
LoadStringA
GetTopWindow
IsDialogMessageW
EnumWindows
GetPropA
MsgWaitForMultipleObjects
DestroyIcon
SetWindowLongW
GetCursor
SetMenu
ShowOwnedPopups
GetDCEx
GetLastActivePopup
InvalidateRect
SetWindowTextA
MessageBeep
EndPaint
SetScrollInfo
GetClassNameA
SetWindowsHookExA
EmptyClipboard
SetParent
UnregisterClassA
MessageBoxA
ReleaseCapture
DispatchMessageA
DrawFrameControl
CharToOemA
MoveWindow
GetWindow
TranslateMessage
SetActiveWindow
InflateRect
GetClassLongA
GetParent
SetForegroundWindow
SetWindowPos
PtInRect
PostQuitMessage
DrawMenuBar
GetSystemMetrics
IsRectEmpty
GetClipboardData
SetWindowPlacement
SetPropA
EnableMenuItem
WindowFromPoint
UnhookWindowsHookEx
EqualRect
EnableScrollBar
DrawAnimatedRects
DefWindowProcA
PeekMessageA
SetRect
TrackPopupMenu
DrawTextA
ClientToScreen
KillTimer
GetIconInfo
CreatePopupMenu
GetKeyboardLayoutList
GetMenuItemID
GetClassInfoA
DrawIconEx
GetKeyNameTextA
CharLowerA
CharNextW
CharUpperBuffA
IsDialogMessageA
PeekMessageW
IsWindow
CloseClipboard
SetClassLongA
GetDlgItem
IsChild
GetCapture
CheckMenuItem
DestroyMenu
ScreenToClient
GetWindowLongA
GetKeyboardLayoutNameA
GetScrollRange
RegisterClipboardFormatA
DefFrameProcA
CreateWindowExA
SetWindowLongA
EnumChildWindows
GetMenuItemInfoA
ScrollWindow
OpenClipboard
SetScrollRange
GetSubMenu
BeginPaint
MapWindowPoints
CreateIcon
ActivateKeyboardLayout
ole32
CoDisconnectObject
MkParseDisplayName
CoFreeUnusedLibraries
CoRevokeClassObject
gdi32
GetPixel
GetClipBox
SelectPalette
SelectObject
SetBkMode
CreateCompatibleDC
CreatePalette
BitBlt
CreatePenIndirect
GetDIBColorTable
msvcrt
malloc
exit
tan
exp
cos
strncmp
memmove
log10
strlen
comdlg32
GetFileTitleA
GetOpenFileNameA
ChooseColorA
FindTextA
GetSaveFileNameA
Sections
.text Size: 155KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 7KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ