Static task
static1
Behavioral task
behavioral1
Sample
b076327068955a4e4c7d47562bd42dbb08e2086e1c3b3cb53b2759ff7f2d0353.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b076327068955a4e4c7d47562bd42dbb08e2086e1c3b3cb53b2759ff7f2d0353.exe
Resource
win10v2004-20220812-en
General
-
Target
b076327068955a4e4c7d47562bd42dbb08e2086e1c3b3cb53b2759ff7f2d0353
-
Size
106KB
-
MD5
8a0b37b35c55212e1b291a0fcb094400
-
SHA1
6fe3032fe49a29412b0c1d0f1c44cb43901d75d4
-
SHA256
b076327068955a4e4c7d47562bd42dbb08e2086e1c3b3cb53b2759ff7f2d0353
-
SHA512
dedb2a00d5ad65f9f2d7aaa13d5ae6d6607ff1c3950a6566124b2a00fc1eccc07c188fe6804912fb1b5e31900f3cace51c137c66c07a33352a748eaa8739703d
-
SSDEEP
3072:UE6CzblqeFJeip5MIIAPmc0CWgWjH1tzpyL4:UhCk/ALFWr1JY4
Malware Config
Signatures
Files
-
b076327068955a4e4c7d47562bd42dbb08e2086e1c3b3cb53b2759ff7f2d0353.exe windows x86
491294c5cbad495067d4c157c81ac83c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegLoadKeyA
RegQueryValueA
kernel32
GetVersionExA
MoveFileExA
ReadFile
GlobalDeleteAtom
GetTickCount
GetStringTypeA
GetCurrentThreadId
SetLastError
GetCurrentProcess
GetStringTypeW
FormatMessageA
SetEvent
GetLastError
HeapFree
lstrcatA
ResetEvent
DeleteCriticalSection
MoveFileA
GetDateFormatA
WaitForSingleObject
EnumCalendarInfoA
WriteFile
FindResourceA
VirtualAlloc
GlobalFindAtomA
GlobalAlloc
LocalReAlloc
GetOEMCP
ExitThread
lstrcmpA
GetFullPathNameA
CreateThread
DeleteFileA
LoadLibraryExA
HeapAlloc
VirtualAllocEx
GetDiskFreeSpaceA
VirtualFree
LoadResource
MulDiv
GetACP
lstrlenA
RaiseException
FreeLibrary
GlobalAddAtomA
WideCharToMultiByte
FindClose
GetEnvironmentStrings
GetFileAttributesA
lstrcmpiA
CloseHandle
GetModuleFileNameA
lstrcpynA
GetProcAddress
GetVersion
HeapDestroy
FreeResource
SetErrorMode
LocalAlloc
LockResource
CreateFileA
GetThreadLocale
SetThreadLocale
SizeofResource
GetFileType
GetCurrentProcessId
lstrcpyA
FindFirstFileA
Sleep
GetStdHandle
GetLocaleInfoA
GetLocalTime
LocalFree
GetUserDefaultLCID
ExitProcess
InitializeCriticalSection
LoadLibraryA
SetFilePointer
VirtualFree
GlobalFindAtomA
LocalAlloc
VirtualAlloc
GetCurrentThread
GetCurrentProcessId
HeapFree
GetTickCount
WideCharToMultiByte
FreeResource
LocalFree
GetVersionExA
GetVersion
LockResource
SetLastError
GetStringTypeW
GlobalDeleteAtom
ReadFile
GetFileAttributesA
GetDiskFreeSpaceA
SetEvent
lstrcatA
GetModuleFileNameA
DeleteCriticalSection
CreateThread
GetEnvironmentStrings
MulDiv
CloseHandle
GetDateFormatA
SetEndOfFile
GetFullPathNameA
lstrcpynA
GetFileType
HeapAlloc
SetHandleCount
SetFilePointer
GetLocaleInfoA
FindFirstFileA
GetStringTypeA
CreateEventA
SizeofResource
lstrlenA
lstrcmpA
GetCurrentProcess
ResetEvent
FindResourceA
GlobalAlloc
MoveFileA
CompareStringA
HeapDestroy
Sleep
lstrcmpiA
GetCPInfo
GetOEMCP
GetCurrentThreadId
WriteFile
ExitProcess
GetModuleHandleA
LoadResource
EnumCalendarInfoA
VirtualQuery
DeleteFileA
GetCommandLineA
SetThreadLocale
ExitThread
LocalReAlloc
GetLocalTime
GetACP
GetThreadLocale
GetProcAddress
GetStdHandle
GetSystemDefaultLangID
GetLastError
InitializeCriticalSection
GetStartupInfoA
MoveFileExA
lstrcpyA
LoadLibraryExA
EnterCriticalSection
GetUserDefaultLCID
FreeLibrary
FormatMessageA
GetProcessHeap
LoadLibraryA
VirtualAllocEx
GlobalAddAtomA
comdlg32
ChooseColorA
FindTextA
FindTextA
gdi32
CreatePalette
GetPaletteEntries
GetDIBColorTable
CreateCompatibleBitmap
CreateBitmap
BitBlt
GetCurrentPositionEx
RestoreDC
CreateDIBSection
GetCurrentPositionEx
CreateBrushIndirect
GetDIBColorTable
CreateCompatibleBitmap
GetRgnBox
shell32
Shell_NotifyIconA
SHFileOperationA
SHGetDiskFreeSpaceA
SHGetSpecialFolderLocation
SHGetDesktopFolder
SHGetFolderPathA
DragQueryFileA
SHGetFileInfoA
SHFileOperationA
ole32
CLSIDFromString
CoGetContextToken
CoTaskMemFree
CoCreateGuid
PropVariantClear
CreateBindCtx
WriteClassStm
CLSIDFromProgID
CoGetMalloc
CoDisconnectObject
CoGetMalloc
WriteClassStm
CoCreateInstanceEx
ReleaseStgMedium
GetHGlobalFromStream
CLSIDFromProgID
CoReleaseMarshalData
CoDisconnectObject
CoRevokeClassObject
CoGetObjectContext
OleCreateStaticFromData
CLSIDFromProgID
CoUnmarshalInterface
StgOpenStorage
CreateBindCtx
CreateOleAdviseHolder
StringFromIID
ntdll
atol
wcscat
NtWaitForSingleObject
RtlDeleteCriticalSection
atoi
_wcsnicmp
shlwapi
SHQueryValueExA
SHQueryInfoKeyA
PathGetCharTypeA
SHGetValueA
SHEnumValueA
PathIsContentTypeA
msvcrt
mbstowcs
atol
memset
exit
wcsncmp
sqrt
memcpy
tolower
time
memmove
strlen
strcmp
strncmp
user32
MessageBoxA
CheckMenuItem
CharLowerA
GetFocus
DeferWindowPos
SystemParametersInfoA
GetLastActivePopup
CallNextHookEx
GetMenuStringA
SetWindowLongA
TrackPopupMenu
CallWindowProcA
DefWindowProcA
GetMenuState
GetCursor
IsWindowVisible
CharToOemA
FrameRect
GetMenuItemCount
DefFrameProcA
GetMenuItemInfoA
GetMessagePos
EnumWindows
EndDeferWindowPos
DispatchMessageA
DrawEdge
EnumThreadWindows
GetActiveWindow
GetDC
GetWindow
IsDialogMessageA
CharNextA
EnableWindow
RegisterClassA
EnumChildWindows
GetSysColor
SetCursor
DispatchMessageW
DrawMenuBar
GetCursorPos
ShowScrollBar
GetKeyState
IsWindowEnabled
EnableMenuItem
CreatePopupMenu
GetScrollRange
DefMDIChildProcA
FindWindowA
GetDlgItem
SetWindowTextA
GetWindowTextA
CreateIcon
GetDCEx
CreateMenu
GetForegroundWindow
DrawIconEx
GetSubMenu
ShowWindow
DrawFrameControl
GetMenuItemID
GetParent
FillRect
DrawTextA
GetDesktopWindow
GetMenu
IsMenu
ClientToScreen
IsChild
GetIconInfo
GetKeyNameTextA
BeginPaint
CreateWindowExA
EqualRect
GetScrollPos
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoA
comctl32
ImageList_Draw
ImageList_DrawEx
ImageList_Remove
oleaut32
GetErrorInfo
SysFreeString
SafeArrayGetElement
SafeArrayUnaccessData
OleLoadPicture
Sections
CODE Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.init Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE