Static task
static1
Behavioral task
behavioral1
Sample
b78dbe19a24747026e7b0f86930072c14cd6016cfb064084ff9153b8ec8d69b1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b78dbe19a24747026e7b0f86930072c14cd6016cfb064084ff9153b8ec8d69b1.exe
Resource
win10v2004-20220812-en
General
-
Target
b78dbe19a24747026e7b0f86930072c14cd6016cfb064084ff9153b8ec8d69b1
-
Size
688KB
-
MD5
5bf22584a8b8382b7b33aee80d4fcd78
-
SHA1
49d9fb5add13b2b235b37f28712351cf5d72ba2c
-
SHA256
b78dbe19a24747026e7b0f86930072c14cd6016cfb064084ff9153b8ec8d69b1
-
SHA512
85725bdb3794d50271b4e392c0b691687f71b8b6c9f261e7c5ae1e5909ca2f120aa8921b662b1cc161d80d14c090d4419146944afaec3c9bef7a43fdf5555856
-
SSDEEP
12288:mpPw7Jb82CVsRUA6QhIE3LoeX5/m3qJJlnSKQSnsesexlyxdoJ5b38OOeemMedM:KwtbhNuE3LJY3q0heHKdiz8OnemMqM
Malware Config
Signatures
Files
-
b78dbe19a24747026e7b0f86930072c14cd6016cfb064084ff9153b8ec8d69b1.exe windows x86
2959445f9f01296342b9a2410cbf55fa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EnableWindow
GetMenuItemID
GetClassNameA
CopyRect
LoadBitmapA
SetFocus
DrawTextExA
GetFocus
DestroyMenu
UnionRect
SendMessageA
GetScrollPos
InsertMenuA
LoadIconA
LoadImageA
DestroyCursor
SetWindowLongA
GetSysColorBrush
ModifyMenuA
DestroyIcon
InsertMenuItemA
EnumWindows
CopyAcceleratorTableA
PtInRect
IsChild
RemoveMenu
GetDlgCtrlID
DrawIconEx
EmptyClipboard
SetWindowPos
RegisterWindowMessageA
UnregisterClassA
GetMenu
GetCapture
BeginPaint
IsDlgButtonChecked
GetMessagePos
GetWindowDC
IsIconic
SetParent
GetDesktopWindow
EnumChildWindows
GrayStringA
UnhookWindowsHookEx
UpdateWindow
LoadStringA
IsRectEmpty
ExitWindowsEx
SetWindowTextA
GetWindowTextLengthA
TranslateMessage
SetCapture
DispatchMessageA
GetDC
IsDialogMessageA
MapVirtualKeyA
GetWindowThreadProcessId
LoadMenuA
GetScrollInfo
RegisterClassA
GetDlgItem
LoadAcceleratorsA
LoadCursorA
GetMessageA
GetSystemMenu
EndPaint
TabbedTextOutA
MapDialogRect
RegisterClassExA
SetWindowRgn
MessageBeep
MessageBoxA
ShowCaret
EndDialog
GetSubMenu
GetClassInfoExA
GetMenuState
MoveWindow
GetWindowLongA
GetSysColor
CopyIcon
SystemParametersInfoA
IsWindowEnabled
IsWindowVisible
DeleteMenu
KillTimer
IsWindow
ClientToScreen
ReleaseDC
SetRect
RegisterClipboardFormatA
ShowWindow
SetScrollPos
BringWindowToTop
EqualRect
GetWindowTextA
DrawEdge
GetMenuItemInfoA
GetForegroundWindow
comdlg32
CommDlgExtendedError
GetFileTitleA
oleaut32
LoadTypeLi
gdi32
Polyline
SetTextColor
GetTextMetricsA
SetPolyFillMode
PolyBezier
GetCurrentPositionEx
SetRectRgn
GetPixel
DeleteDC
CreateHatchBrush
CreateFontIndirectA
OffsetViewportOrgEx
DPtoLP
SetViewportOrgEx
GetDeviceCaps
ExtCreateRegion
GetObjectType
SetViewportExtEx
StretchBlt
CreatePatternBrush
SetTextCharacterExtra
ExtFloodFill
GetTextExtentPointA
MoveToEx
SetPaletteEntries
CreatePen
SelectClipRgn
Rectangle
GetTextAlign
CreateCompatibleBitmap
GetSystemPaletteEntries
GetWindowExtEx
GetClipRgn
StartDocA
GetStockObject
GetTextColor
PatBlt
LineTo
GetPaletteEntries
BitBlt
Ellipse
SetBkMode
ScaleViewportExtEx
CreateSolidBrush
GetBkMode
SetBkColor
CreateFontA
DeleteObject
RestoreDC
SaveDC
LPtoDP
SetROP2
CreateRectRgn
CreateDIBitmap
ExtTextOutA
CreateRectRgnIndirect
SetStretchBltMode
EnumFontFamiliesExA
GetTextExtentPoint32A
GetMapMode
SetPixelV
BeginPath
CreatePolygonRgn
SetBrushOrgEx
EndPath
RectVisible
Pie
ScaleWindowExtEx
UnrealizeObject
RectInRegion
GetCurrentObject
kernel32
HeapReAlloc
GetEnvironmentStringsW
LeaveCriticalSection
GetLocalTime
GetStringTypeA
VirtualFree
HeapCreate
GetLastError
GetStartupInfoA
GetEnvironmentStrings
HeapDestroy
InterlockedDecrement
ReadFile
GetCPInfo
SetStdHandle
CompareStringW
TlsSetValue
ExitProcess
LoadLibraryA
HeapValidate
GetACP
DeleteCriticalSection
InitializeCriticalSection
GetTickCount
SetLastError
QueryPerformanceCounter
FreeEnvironmentStringsA
SetHandleCount
GetFileType
GetCommandLineA
EnterCriticalSection
FreeEnvironmentStringsW
IsBadReadPtr
FlushFileBuffers
DebugBreak
MultiByteToWideChar
GetStdHandle
IsBadWritePtr
OutputDebugStringA
GetCurrentThreadId
SetFilePointer
VirtualQuery
SetUnhandledExceptionFilter
WriteFile
GetOEMCP
GetTimeZoneInformation
UnhandledExceptionFilter
GetProcAddress
LCMapStringA
TerminateProcess
VirtualAlloc
GetCurrentProcessId
InterlockedExchange
CloseHandle
GetModuleFileNameA
CreateMutexA
RaiseException
IsBadCodePtr
HeapAlloc
TlsGetValue
CompareStringA
InterlockedIncrement
TlsAlloc
LCMapStringW
RtlUnwind
GetCurrentProcess
GetSystemTime
SetEnvironmentVariableA
GetModuleHandleA
WideCharToMultiByte
GetVersion
GetStringTypeW
HeapFree
GetSystemTimeAsFileTime
Sections
.text Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 472KB - Virtual size: 470KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ