Static task
static1
Behavioral task
behavioral1
Sample
b7d73853714a355b5e5603cc08747655710416b31896763e18459213b5dd8ea9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b7d73853714a355b5e5603cc08747655710416b31896763e18459213b5dd8ea9.exe
Resource
win10v2004-20221111-en
General
-
Target
b7d73853714a355b5e5603cc08747655710416b31896763e18459213b5dd8ea9
-
Size
1.4MB
-
MD5
81ada1f9339a6a2fe7b0ce779d0ace01
-
SHA1
9939c43eeca75f47959d334e54de964654d4b20d
-
SHA256
b7d73853714a355b5e5603cc08747655710416b31896763e18459213b5dd8ea9
-
SHA512
c4e8e9b532bddad5ef5866713205ce30d29897a1ec208aeedf476357dd3c8582a74de7557997ec83cd0f0ef36163eb5f6878bcfbf05d16e17b2b761c50f5b180
-
SSDEEP
24576:MOqKLNwtYHjcmlfgB9JHOz1Ci4iT70Mq02x0ZYFqAXo:MOqKLNwOHjcggm1CDhtj3Xo
Malware Config
Signatures
Files
-
b7d73853714a355b5e5603cc08747655710416b31896763e18459213b5dd8ea9.exe windows x86
25ad776e1e845d6bed6adda335455896
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCPInfo
GetOEMCP
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetCurrentProcess
GetFullPathNameA
CreateFileA
GetFileAttributesA
GetFileTime
WritePrivateProfileStringA
SetErrorMode
VirtualProtect
VirtualAlloc
VirtualQuery
ExitProcess
RtlUnwind
GetSystemTimeAsFileTime
ExitThread
CreateThread
TlsFree
GetDateFormatA
GetFileType
GetStartupInfoA
GetCommandLineA
HeapReAlloc
SetStdHandle
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetCurrentProcessId
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
SetHandleCount
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
InterlockedIncrement
GlobalFlags
LeaveCriticalSection
EnterCriticalSection
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
lstrcmpA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
InterlockedDecrement
SetLastError
MulDiv
lstrcpynA
FreeResource
GetCurrentDirectoryA
GetDriveTypeA
GetVolumeInformationA
GetSystemInfo
FormatMessageA
LocalFree
QueryPerformanceCounter
GetSystemDirectoryA
ExpandEnvironmentStringsA
GetTempPathA
LoadLibraryW
DeleteFileW
CreateDirectoryW
CreateFileW
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SetFileAttributesW
GetFileAttributesW
GetModuleHandleA
GetProcessHeap
HeapAlloc
HeapFree
LoadLibraryA
GetProcAddress
FreeLibrary
CreateMutexA
ReleaseMutex
SetFileAttributesA
MoveFileExA
RemoveDirectoryA
CreateDirectoryA
Process32First
OpenProcess
GetExitCodeProcess
TerminateProcess
Process32Next
CreateToolhelp32Snapshot
Module32First
CloseHandle
DeleteFileA
GetModuleFileNameA
FindFirstFileA
FindNextFileA
FindClose
GetTickCount
Sleep
ResumeThread
WaitForSingleObject
TerminateThread
CompareStringW
CompareStringA
FindResourceA
SizeofResource
LoadResource
LockResource
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
lstrlenA
lstrcmpiA
GetVersion
DeleteCriticalSection
InitializeCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
GetTimeFormatA
InterlockedExchange
user32
DestroyMenu
SetWindowContextHelpId
MapDialogRect
GetMessageA
TranslateMessage
ValidateRect
wsprintfA
SetMenuItemBitmaps
ModifyMenuA
CheckMenuItem
GetMenuCheckMarkDimensions
WinHelpA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
IsChild
GetForegroundWindow
DispatchMessageA
GetTopWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
MessageBoxA
GetKeyState
SetScrollPos
IsWindowVisible
UpdateWindow
GetMenu
AdjustWindowRectEx
EqualRect
GetScrollInfo
SetScrollInfo
GetClassInfoA
RegisterClassA
DefWindowProcA
CallWindowProcA
IntersectRect
GetWindowPlacement
GetWindowTextLengthA
GetWindowTextA
GetFocus
SetWindowPos
SetFocus
MoveWindow
SetWindowLongA
GetDlgCtrlID
SetCapture
SendDlgItemMessageA
GetWindow
EndPaint
BeginPaint
GrayStringA
DrawTextExA
TabbedTextOutA
UnhookWindowsHookEx
GetMenuState
GetMenuItemCount
GetDesktopWindow
GetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
PostThreadMessageA
CharUpperA
SendMessageA
BringWindowToTop
GetWindowRect
ScreenToClient
SetForegroundWindow
IsWindowEnabled
GetNextDlgTabItem
EndDialog
SetWindowTextA
ShowWindow
OffsetRect
GetNextDlgGroupItem
ReleaseCapture
GetCapture
ClientToScreen
WindowFromPoint
SetCursor
GetWindowDC
DrawTextA
SystemParametersInfoA
GetClassNameA
RegisterClipboardFormatA
GetCursorPos
TrackPopupMenu
SetMenuDefaultItem
SetActiveWindow
LoadMenuA
GetSubMenu
GetMenuItemID
LoadCursorA
GetSysColorBrush
SetWindowRgn
MessageBeep
InvalidateRgn
CopyAcceleratorTableA
CharNextA
IsDialogMessageA
EnableWindow
GetSystemMetrics
UnregisterClassA
RegisterWindowMessageA
PostMessageA
IsWindow
SetTimer
KillTimer
DrawIcon
IsIconic
GetClientRect
LoadIconA
PostQuitMessage
FindWindowA
GetLastActivePopup
CopyRect
IsRectEmpty
PtInRect
SetRect
InflateRect
FillRect
DrawEdge
DrawFocusRect
GetDC
ReleaseDC
InvalidateRect
RedrawWindow
GetParent
GetScrollPos
GetSysColor
GetWindowLongA
LoadBitmapA
EnableMenuItem
gdi32
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
CreateBitmap
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetRgnBox
CreateFontIndirectA
GetViewportExtEx
GetClipBox
SetMapMode
SetTextColor
SetBkMode
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
SelectClipRgn
StretchBlt
DeleteDC
GetDIBits
CreateRectRgn
CombineRgn
GetPixel
DeleteObject
GetTextExtentPoint32A
GetStockObject
SelectObject
CreateCompatibleBitmap
CreateSolidBrush
BitBlt
CreateCompatibleDC
GetObjectA
GetWindowExtEx
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegQueryValueA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegQueryInfoKeyA
RegEnumValueA
RegEnumKeyA
RegCloseKey
RegOpenKeyA
shell32
SHGetSpecialFolderPathA
ShellExecuteA
SHEmptyRecycleBinA
Shell_NotifyIconA
comctl32
ord17
_TrackMouseEvent
ImageList_Destroy
shlwapi
PathFileExistsA
PathFindExtensionA
PathFindFileNameA
UrlUnescapeA
PathStripToRootA
PathRemoveFileSpecA
PathIsUNCA
oledlg
ord8
ole32
OleIsCurrentClipboard
CreateStreamOnHGlobal
CoUninitialize
CoCreateInstance
CoInitialize
CoInitializeEx
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
CoRegisterMessageFilter
OleFlushClipboard
oleaut32
SysAllocStringLen
SystemTimeToVariantTime
VariantClear
VariantChangeType
VariantInit
SysStringLen
SysAllocStringByteLen
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SysAllocString
OleCreateFontIndirect
SysFreeString
gdiplus
GdiplusShutdown
GdipCloneImage
GdipAlloc
GdipFree
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipDisposeImage
GdiplusStartup
GdipCreateHBITMAPFromBitmap
iphlpapi
GetAdaptersInfo
GetPerAdapterInfo
wininet
InternetQueryDataAvailable
InternetOpenUrlA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
InternetQueryOptionA
InternetCanonicalizeUrlA
InternetCrackUrlA
HttpQueryInfoA
InternetGetConnectedState
InternetCheckConnectionA
rpcrt4
UuidCreate
UuidToStringA
RpcStringFreeA
Sections
.text Size: 316KB - Virtual size: 313KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ