Static task
static1
Behavioral task
behavioral1
Sample
b13db5bd464da316b293dc0ec2799066cba791a2cf473142bcf85ba76487ec84.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b13db5bd464da316b293dc0ec2799066cba791a2cf473142bcf85ba76487ec84.exe
Resource
win10v2004-20220812-en
General
-
Target
b13db5bd464da316b293dc0ec2799066cba791a2cf473142bcf85ba76487ec84
-
Size
136KB
-
MD5
b8ccca6827cac591ab15c01768ee7ea9
-
SHA1
15e6c108171bfd8e742cda946360ce744105baf4
-
SHA256
b13db5bd464da316b293dc0ec2799066cba791a2cf473142bcf85ba76487ec84
-
SHA512
8296eeb70dac66096f2f49246ddd272202169b57f93c23978cca96f9e2f22d4983236412687ee9da4dc95f78930ccd5b5985384307971416af8d7f81b42a1ca2
-
SSDEEP
1536:U0eK6Aqod52ajHe0wh8T8j9R4Xm9/5kIsGgdW+3btKS+dFF4R56tYi3qpt4ncIjd:7vq8hjeZNuOozw3inmru6tdcIgTaO4
Malware Config
Signatures
Files
-
b13db5bd464da316b293dc0ec2799066cba791a2cf473142bcf85ba76487ec84.exe windows x86
d125cbfd58b5d667bfdda48f6d313795
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetSystemMetrics
wsprintfA
MessageBoxA
CreateIconFromResource
SetWindowRgn
CreateWindowExA
SetWindowPos
PostThreadMessageA
UnhookWindowsHookEx
SetWindowsHookExA
GetWindowThreadProcessId
IsWindow
CallNextHookEx
FillRect
GetSysColor
GetDC
TrackMouseEvent
GetParent
InvalidateRect
MoveWindow
GetClassInfoExA
PostQuitMessage
CallWindowProcA
ReleaseCapture
EndPaint
TranslateMessage
DispatchMessageA
ReleaseDC
DrawTextA
DrawIconEx
SendMessageA
BeginPaint
GetWindowDC
GetWindowRect
GetWindowTextA
DefWindowProcA
RegisterClassExA
LoadCursorA
LoadIconA
ShowWindow
WaitForInputIdle
GetMessageA
kernel32
GlobalFree
MulDiv
CreateThread
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SuspendThread
ResumeThread
GetExitCodeThread
TerminateThread
GetCurrentThreadId
GetProcessHeap
ExitProcess
HeapAlloc
GlobalLock
GlobalUnlock
LCMapStringA
GetTickCount
SetFilePointer
ReadFile
CreateFileA
WriteFile
GetModuleFileNameA
IsBadReadPtr
HeapFree
CreateFileMappingA
MapViewOfFile
RtlMoveMemory
lstrcpyn
CreateProcessA
WaitForSingleObject
CloseHandle
LoadLibraryA
GetCurrentDirectoryA
LocalAlloc
RtlFillMemory
LocalFree
LocalSize
GetModuleHandleA
GetProcAddress
FreeLibrary
GlobalAlloc
HeapReAlloc
gdi32
CreateCompatibleDC
SelectObject
SetBkMode
SetTextColor
CreateFontA
BitBlt
DeleteObject
DeleteDC
StretchBlt
GetObjectA
CreateSolidBrush
CreateDCA
GetDeviceCaps
CreateRoundRectRgn
CreateCompatibleBitmap
ole32
CreateStreamOnHGlobal
olepro32
ord251
msvcrt
_ftol
??2@YAPAXI@Z
free
strncpy
realloc
malloc
sprintf
srand
rand
strtod
??3@YAXPAX@Z
modf
shlwapi
PathFileExistsA
Sections
.text Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 344KB - Virtual size: 343KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE