Static task
static1
Behavioral task
behavioral1
Sample
b7ddf4f67db702e96f5f3e9a273c76d11428f4afb03c2b67195363debff2aa4e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b7ddf4f67db702e96f5f3e9a273c76d11428f4afb03c2b67195363debff2aa4e.exe
Resource
win10v2004-20220812-en
General
-
Target
b7ddf4f67db702e96f5f3e9a273c76d11428f4afb03c2b67195363debff2aa4e
-
Size
673KB
-
MD5
6843b46dbd5498536bb50975d0d40915
-
SHA1
220960eb00d1667dac470ee685900dff968f9061
-
SHA256
b7ddf4f67db702e96f5f3e9a273c76d11428f4afb03c2b67195363debff2aa4e
-
SHA512
d4e61b90d11a4c3c19280296cc1b04a7a09eebd5cfbaae51058249798e148a2367c50306fee57ac0f1595c255d9999cd59d4f7c1fa83c71a19c481d9412b90af
-
SSDEEP
12288:gI3q2BBYe8Zc+2/4UDiDVPYNXaf5kWGaA2XkdR1GcG0ioUf8gchawlPUpVuZX:3q2fnz4g+moGE8R1G/VoUKawJaE
Malware Config
Signatures
Files
-
b7ddf4f67db702e96f5f3e9a273c76d11428f4afb03c2b67195363debff2aa4e.exe windows x86
752d8a1db7cd8ab247ffba957feef8de
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MapWindowPoints
DestroyWindow
DestroyMenu
PostQuitMessage
SetWindowPos
IsWindow
DispatchMessageA
GetDC
GetCursorPos
PtInRect
GetParent
ShowWindow
TranslateMessage
IsWindowEnabled
RegisterClassA
CreateWindowExA
EndPaint
SetFocus
PeekMessageA
BeginPaint
DefWindowProcA
GetSystemMetrics
GetWindowRect
ReleaseCapture
SetWindowLongA
EndDialog
SetWindowTextA
CheckMenuItem
GetDlgItem
ScreenToClient
LoadCursorA
GetDesktopWindow
SetForegroundWindow
FillRect
SetDlgItemTextA
MessageBoxA
GetSysColor
IsWindowVisible
wsprintfA
GetClientRect
CallWindowProcA
oleaut32
SysAllocString
SysFreeString
SysStringLen
kernel32
GetSystemInfo
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
WaitForSingleObject
FindNextFileA
HeapDestroy
GetFileAttributesW
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
LocalAlloc
CreateFileA
SetErrorMode
SetStdHandle
GetTempPathA
WideCharToMultiByte
lstrcmpiA
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
SetFileAttributesA
FreeLibrary
LocalFree
FormatMessageW
InitializeCriticalSection
FindClose
InterlockedDecrement
FormatMessageA
SetLastError
GetModuleFileNameW
IsDebuggerPresent
GetModuleFileNameA
LoadLibraryExA
SetConsoleCtrlHandler
UnhandledExceptionFilter
LoadLibraryExW
MultiByteToWideChar
GetLocalTime
CreateMutexA
CreateThread
SetUnhandledExceptionFilter
GetCurrentThread
GetTickCount
GetVersion
GetModuleHandleA
GetCurrentThreadId
GetCurrentProcessId
GetCommandLineA
ExitProcess
VirtualAlloc
GetLastError
FindResourceA
Sleep
VirtualFree
HeapCreate
IsValidCodePage
SizeofResource
GetModuleHandleW
GlobalLock
GetACP
CloseHandle
ReadFile
SetFilePointer
TlsFree
MapViewOfFile
RaiseException
InterlockedCompareExchange
GetCurrentDirectoryA
LockResource
GetEnvironmentStrings
lstrlenW
GlobalUnlock
GetEnvironmentStringsW
GetThreadLocale
LCMapStringA
GlobalFree
lstrlenA
LCMapStringW
LeaveCriticalSection
HeapAlloc
TlsSetValue
GetFileType
CreateEventA
CreateFileW
CreateEventW
GlobalAlloc
WaitForMultipleObjects
FindFirstFileW
CompareStringA
FindFirstFileA
CompareStringW
GetProcessHeap
GetProcAddress
GetCPInfo
GetFileSize
GetStartupInfoA
LoadLibraryA
GetVersionExA
TlsAlloc
IsBadWritePtr
QueryPerformanceCounter
GetOEMCP
LoadLibraryW
SetHandleCount
EnterCriticalSection
HeapFree
InterlockedIncrement
SetEndOfFile
GetConsoleMode
VirtualQuery
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
Sections
.text Size: 637KB - Virtual size: 963KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ