Static task
static1
Behavioral task
behavioral1
Sample
b46bbe9723c6814bcf000fdf8b53d7cbae115aae84a3f4999c497d6ce3ff0f3e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b46bbe9723c6814bcf000fdf8b53d7cbae115aae84a3f4999c497d6ce3ff0f3e.exe
Resource
win10v2004-20220812-en
General
-
Target
b46bbe9723c6814bcf000fdf8b53d7cbae115aae84a3f4999c497d6ce3ff0f3e
-
Size
636KB
-
MD5
299c586d5e2636cba909c8b903b80310
-
SHA1
926dd074252862281406043a2aa45971f1c68815
-
SHA256
b46bbe9723c6814bcf000fdf8b53d7cbae115aae84a3f4999c497d6ce3ff0f3e
-
SHA512
297af7a22e0a57131ff48e014718e01084d8b09ee48d9c90b6f82b11664950ece46c0606291012ee3bd8a7485c77951ce7e7d5fbfaded890a92409f2c39f5f57
-
SSDEEP
12288:yRzflN9LswnIzLXQJwU30dA8M/KtRYBfLenUYrwXguuoMV:ytflNIPXQJmdA8MC3YVbqV
Malware Config
Signatures
Files
-
b46bbe9723c6814bcf000fdf8b53d7cbae115aae84a3f4999c497d6ce3ff0f3e.exe windows x86
14ad02344740d4404484437ec5e9e03c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
GetDriveTypeA
FindNextFileA
TerminateProcess
OpenProcess
GetSystemDirectoryA
WideCharToMultiByte
MultiByteToWideChar
SetCurrentDirectoryA
GetFullPathNameA
GetCurrentDirectoryA
DeleteFileA
RemoveDirectoryA
CreateDirectoryA
GetModuleFileNameA
FlushFileBuffers
SetStdHandle
IsBadCodePtr
IsBadReadPtr
SetEnvironmentVariableA
GetDiskFreeSpaceA
CompareStringA
SetFilePointer
VirtualProtect
InitializeCriticalSection
GetLocaleInfoA
VirtualQuery
InterlockedExchange
SetUnhandledExceptionFilter
LCMapStringW
GetVersion
GetSystemInfo
InterlockedDecrement
InterlockedIncrement
FreeLibrary
LoadLibraryA
CreateMutexA
GetLastError
ReleaseMutex
WaitForSingleObject
CloseHandle
WinExec
CreateProcessA
GetCurrentProcess
WritePrivateProfileStringA
MoveFileExA
GetWindowsDirectoryA
FindClose
SetErrorMode
GetVersionExA
CompareStringW
GetProcAddress
GetShortPathNameA
ExitProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
HeapAlloc
HeapFree
HeapReAlloc
SetFileAttributesA
GetFileAttributesA
MoveFileA
GetACP
GetOEMCP
GetCPInfo
RtlUnwind
RaiseException
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapSize
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
LCMapStringA
SetEnvironmentVariableW
user32
CharPrevA
CharNextA
GetSystemMetrics
SetWindowTextA
LoadIconA
SendMessageA
BringWindowToTop
SendDlgItemMessageA
InvalidateRect
UpdateWindow
EndDialog
SystemParametersInfoA
GetParent
GetWindowRect
SetWindowPos
IsWindow
CreateDialogParamA
GetSysColor
MessageBoxA
ExitWindowsEx
FindWindowA
RegisterClassA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
PostQuitMessage
KillTimer
SetTimer
PostMessageA
DefWindowProcA
advapi32
RegEnumKeyExA
RegQueryValueExA
RegEnumKeyA
RegDeleteKeyA
RegSetValueA
RegOpenKeyA
RegQueryValueA
RegDeleteValueA
RegOpenKeyExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
gdi32
SetBkColor
DeleteObject
CreateSolidBrush
SetTextColor
comctl32
ord17
Sections
.text Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 516KB - Virtual size: 921KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 32.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE