Static task
static1
Behavioral task
behavioral1
Sample
b1ae64f8abf04b621aaf038a58e0bf6a2420f79d7d88f469c3d76d97b69ee49a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b1ae64f8abf04b621aaf038a58e0bf6a2420f79d7d88f469c3d76d97b69ee49a.exe
Resource
win10v2004-20220812-en
General
-
Target
b1ae64f8abf04b621aaf038a58e0bf6a2420f79d7d88f469c3d76d97b69ee49a
-
Size
89KB
-
MD5
394109a5ba925409002a59aeb95be25b
-
SHA1
382297c9ace5e51da6e50b87f63c85f64008f621
-
SHA256
b1ae64f8abf04b621aaf038a58e0bf6a2420f79d7d88f469c3d76d97b69ee49a
-
SHA512
2a8c0bded062a4aa093bcc07dc930a772f39c95bd79bf02ec2d8d7cafad4e89267927290bd1a21dea784a51e94bf9caecab8f74aa575648e7b557267a2ace4ff
-
SSDEEP
1536:6x878287VQ8y/JRiBMo3VOQGSugxnjgNIRQULRo4u4UO:6K7qe/Je3kSugxnjgNIRQe3j
Malware Config
Signatures
Files
-
b1ae64f8abf04b621aaf038a58e0bf6a2420f79d7d88f469c3d76d97b69ee49a.exe windows x86
1cd301e1e3c7957798872f7c69904612
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memcpy
strncpy
sprintf
strcmp
strncmp
fabs
ceil
malloc
floor
free
fclose
strlen
strcpy
strcat
kernel32
GetModuleHandleA
HeapCreate
HeapDestroy
ExitProcess
HeapAlloc
HeapFree
FreeLibrary
MultiByteToWideChar
SetLastError
InitializeCriticalSection
TlsAlloc
LoadLibraryA
GetProcAddress
GetVersionExA
CloseHandle
GetCurrentProcess
DuplicateHandle
CreatePipe
GetStdHandle
CreateProcessA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
Sleep
DeleteFileA
WriteFile
CreateFileA
SetFilePointer
HeapReAlloc
comctl32
InitCommonControls
InitCommonControlsEx
user32
CharUpperA
GetWindow
SetActiveWindow
RemovePropA
SendMessageA
DestroyWindow
UnregisterClassA
DestroyAcceleratorTable
LoadIconA
LoadCursorA
RegisterClassA
AdjustWindowRectEx
GetSystemMetrics
GetActiveWindow
GetWindowRect
CreateWindowExA
SetPropA
ShowWindow
CreateAcceleratorTableA
PeekMessageA
MsgWaitForMultipleObjects
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
SetCursorPos
LoadImageA
SetCursor
GetWindowLongA
GetParent
MapWindowPoints
MoveWindow
SystemParametersInfoA
GetKeyState
SetCapture
PostMessageA
GetCursorPos
ReleaseCapture
GetPropA
SetFocus
GetFocus
GetClientRect
FillRect
EnumChildWindows
DefFrameProcA
DefWindowProcA
IsWindowEnabled
IsWindowVisible
IsChild
GetClassNameA
CallWindowProcA
SetWindowLongA
DestroyIcon
gdi32
DeleteObject
GetStockObject
GetObjectType
GetObjectA
CreateCompatibleDC
GetDIBits
DeleteDC
CreateDIBSection
SelectObject
BitBlt
CreateBitmap
SetPixel
advapi32
RegCreateKeyExA
RegConnectRegistryA
RegCloseKey
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ShellExecuteExA
ole32
CoInitialize
RevokeDragDrop
wsock32
closesocket
WSACleanup
WSAStartup
winmm
timeBeginPeriod
timeEndPeriod
Sections
.code Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 374B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 700B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ