Static task
static1
Behavioral task
behavioral1
Sample
b4c69dbedb0b6b2711836b20fb0e3ca29f4b2609363967a4527d2fc375b05532.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b4c69dbedb0b6b2711836b20fb0e3ca29f4b2609363967a4527d2fc375b05532.exe
Resource
win10v2004-20220901-en
General
-
Target
b4c69dbedb0b6b2711836b20fb0e3ca29f4b2609363967a4527d2fc375b05532
-
Size
724KB
-
MD5
3029fbf151679bb25e5461c48f68a20e
-
SHA1
6ab03128314a76bd1e6a12bd3ccc54ebf72ba1da
-
SHA256
b4c69dbedb0b6b2711836b20fb0e3ca29f4b2609363967a4527d2fc375b05532
-
SHA512
95d6b7c644d49d1832ed706026c96a49455d8a9cd28ddb034b3d67b0190c34946ec5c52228136ae23058fc4d59c6fc84d0204fcb37470d7c5931c028020caebe
-
SSDEEP
12288:t37nygBidQr5ixUCZhJYL/demC4zAyPZu5QL2CKygFgSvn+1swCgEk:t3WmQ6iF/Js/demCyHZmQLMlgSFNgEk
Malware Config
Signatures
Files
-
b4c69dbedb0b6b2711836b20fb0e3ca29f4b2609363967a4527d2fc375b05532.exe windows x86
5738098aff2a990d7a9723ed1cba2e67
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetClassLongW
SetCursor
GetSystemMenu
EnumChildWindows
MessageBeep
GetWindowThreadProcessId
LockWindowUpdate
GetWindowTextW
InsertMenuItemW
GetTopWindow
IsDialogMessageW
GetAncestor
FillRect
DestroyCursor
UnhookWindowsHookEx
PeekMessageW
EndPaint
RedrawWindow
GetWindow
BringWindowToTop
GetWindowDC
CreateWindowExW
GetWindowRgn
SetMenu
GetSystemMetrics
AppendMenuW
MoveWindow
GetDC
DestroyWindow
ReleaseDC
InflateRect
GetMenuState
GetDlgItem
GetScrollInfo
GetSysColorBrush
LoadStringW
EnableMenuItem
EndDeferWindowPos
IsRectEmpty
SetRect
MapWindowPoints
SetForegroundWindow
SetCursorPos
RegisterClassW
IsIconic
SetWindowRgn
DestroyAcceleratorTable
LoadCursorW
EnableWindow
OffsetRect
KillTimer
PostQuitMessage
GetMenuItemID
GetAsyncKeyState
DeferWindowPos
IntersectRect
BeginPaint
InvalidateRgn
LoadImageW
RegisterClipboardFormatW
CopyRect
SetParent
CheckMenuItem
GetKeyState
GetDlgCtrlID
IsWindowEnabled
GetMessageW
RegisterClassExW
GetNextDlgTabItem
InvalidateRect
FindWindowW
DrawStateW
TrackPopupMenu
UnregisterClassW
SystemParametersInfoW
CallWindowProcW
IsWindow
GetWindowTextLengthW
IsZoomed
ShowOwnedPopups
CallNextHookEx
SetTimer
SetScrollInfo
CreateMenu
DrawEdge
GetForegroundWindow
IsMenu
DrawIcon
GetMenuCheckMarkDimensions
SetWindowTextW
MapDialogRect
CloseClipboard
SetWindowLongW
GetActiveWindow
LoadMenuW
EqualRect
DefWindowProcW
DrawFocusRect
DefMDIChildProcW
GetWindowLongW
IsClipboardFormatAvailable
SetWindowPlacement
RegisterWindowMessageW
GetParent
SetWindowPos
BeginDeferWindowPos
wsprintfW
CopyIcon
TranslateMessage
GetMessagePos
ClientToScreen
ShowScrollBar
GetMessageTime
MessageBoxW
GetDesktopWindow
DrawIconEx
GetWindowPlacement
SetDlgItemTextW
GetWindowRect
SendDlgItemMessageW
ReleaseCapture
DispatchMessageW
GetLastActivePopup
GetFocus
UnpackDDElParam
GetMenuStringW
GetSysColor
GetClientRect
DefFrameProcW
WindowFromPoint
CreateDialogIndirectParamW
ShowWindow
SetCapture
CopyImage
IsWindowVisible
GetClassLongW
GetSubMenu
GetClassNameW
EmptyClipboard
LoadIconW
GetIconInfo
LoadAcceleratorsW
GetCursorPos
IsChild
SetMenuItemBitmaps
SystemParametersInfoA
SetScrollPos
GetMenuItemInfoW
DrawFrameControl
SetFocus
OpenClipboard
GetScrollPos
SetMenuDefaultItem
DestroyIcon
WinHelpW
DrawTextExW
ValidateRect
PostMessageW
DestroyMenu
gdi32
CreateBitmapIndirect
CreateFontIndirectA
OffsetClipRgn
SetBitmapDimensionEx
CreateSolidBrush
GetNearestColor
CreateHatchBrush
SelectObject
ScaleWindowExtEx
ExtTextOutA
DPtoLP
GetStockObject
SetPolyFillMode
GetMapMode
DeleteObject
CreateMetaFileA
GetRegionData
ScaleViewportExtEx
CloseMetaFile
PolylineTo
GetBitmapDimensionEx
SetWindowExtEx
SetMapMode
SetArcDirection
kernel32
SetConsoleCtrlHandler
GetStdHandle
GetCurrentThread
FlushFileBuffers
CloseHandle
InterlockedExchange
GetCPInfo
InterlockedIncrement
HeapDestroy
HeapFree
IsBadWritePtr
LoadLibraryA
WriteFile
GetProcAddress
LeaveCriticalSection
SetStdHandle
GetStartupInfoW
SetEnvironmentVariableA
CreateMutexW
LCMapStringA
IsBadReadPtr
SetLastError
GetCurrentProcess
GetModuleFileNameW
WideCharToMultiByte
VirtualQuery
RtlUnwind
CompareStringA
GetLastError
TerminateProcess
HeapReAlloc
EnterCriticalSection
GetSystemTimeAsFileTime
GetSystemTime
GetStringTypeA
IsBadCodePtr
GetStartupInfoA
SetFilePointer
VirtualAlloc
GetVersion
GetEnvironmentStrings
FreeEnvironmentStringsW
GetFileType
GetCommandLineW
ExitProcess
FatalAppExitA
CompareStringW
MultiByteToWideChar
HeapAlloc
GetTickCount
SetHandleCount
ReadFile
TlsGetValue
RaiseException
GetCommandLineA
GetCurrentThreadId
GetCurrentProcessId
UnhandledExceptionFilter
LCMapStringW
GetModuleFileNameA
GetStringTypeW
VirtualFree
QueryPerformanceCounter
GetTimeZoneInformation
GetLocalTime
FreeEnvironmentStringsA
GetModuleHandleW
HeapCreate
GetModuleHandleA
InterlockedDecrement
TlsFree
DeleteCriticalSection
TlsAlloc
SetUnhandledExceptionFilter
InitializeCriticalSection
TlsSetValue
GetEnvironmentStringsW
comdlg32
CommDlgExtendedError
PageSetupDlgA
oleaut32
LoadTypeLi
advapi32
RegQueryInfoKeyA
ControlService
RegCloseKey
RegOpenKeyA
RegSetValueA
RegQueryValueExA
RegDeleteKeyA
CreateServiceA
Sections
.text Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 452KB - Virtual size: 450KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 100KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.urdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE