Static task
static1
Behavioral task
behavioral1
Sample
b8f48680b90885ca5cf2bd1f2acfc8d9d92395ed54535e276830671f9112918d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b8f48680b90885ca5cf2bd1f2acfc8d9d92395ed54535e276830671f9112918d.exe
Resource
win10v2004-20221111-en
General
-
Target
b8f48680b90885ca5cf2bd1f2acfc8d9d92395ed54535e276830671f9112918d
-
Size
552KB
-
MD5
c913a8f4d79bfed6cc13e162e29c4360
-
SHA1
08045d13eb239f9eaf901edfbb28859f0045968a
-
SHA256
b8f48680b90885ca5cf2bd1f2acfc8d9d92395ed54535e276830671f9112918d
-
SHA512
d5c0e7b6927ab624823d4eb2110507ddeb6cf963cca3bd5bfd0e017b056e93189edbc25cad696ecbcad1fb3a9065dd6fefe461a183f5b4122712ae61518d21f3
-
SSDEEP
6144:HBSS+sxa5BmBdOt1hB5TqySWIv0Kv1BK+lzKo3cgvx0LIBhZAaRnpYP2h+497i3D:H/AEBdOfo0K9QVoMbspFb9SnZWK
Malware Config
Signatures
Files
-
b8f48680b90885ca5cf2bd1f2acfc8d9d92395ed54535e276830671f9112918d.exe windows x86
1a8ad30aa6afe5b1389b4fd6cfbe69ba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderPathA
SHGetFileInfoA
ExtractIconA
SHGetFolderPathA
shlwapi
SHDeleteKeyA
SHDeleteValueA
PathIsDirectoryA
PathAddExtensionA
PathFindFileNameA
PathAppendA
PathFindExtensionA
SHGetValueA
PathRemoveExtensionA
PathFileExistsA
SHSetValueA
PathStripToRootA
PathIsUNCA
iphlpapi
GetAdaptersInfo
kernel32
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
GetModuleHandleA
GetModuleFileNameW
InterlockedDecrement
InterlockedIncrement
SystemTimeToFileTime
SetErrorMode
LocalFileTimeToFileTime
SetFileTime
SetFileAttributesA
GetFileTime
SetThreadPriority
ResumeThread
GetCurrentThreadId
SetEvent
SuspendThread
CreateEventA
GlobalFlags
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
FreeResource
GetLocaleInfoA
EnumResourceLanguagesA
ConvertDefaultLocale
GetCurrentThread
GetCPInfo
GetOEMCP
GetPrivateProfileIntA
WritePrivateProfileStringA
GetPrivateProfileStringA
LeaveCriticalSection
HeapFree
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetFileInformationByHandle
PeekNamedPipe
GetFileType
ExitProcess
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RaiseException
RtlUnwind
ExitThread
CreateThread
HeapSize
HeapDestroy
HeapCreate
VirtualFree
FatalAppExitA
GetStdHandle
GetConsoleCP
GetConsoleMode
GetACP
SetStdHandle
SetHandleCount
SetConsoleCtrlHandler
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetLocaleInfoW
SetCurrentDirectoryA
SetEnvironmentVariableA
LocalAlloc
GetCurrentProcessId
GetAtomNameA
GlobalGetAtomNameA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
MoveFileA
GlobalFree
CopyFileA
GlobalSize
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
GetTempPathA
CreateMutexA
RemoveDirectoryA
Sleep
MoveFileExA
GetTempFileNameA
lstrcmpA
lstrcpyA
SetLastError
GetComputerNameA
DeleteFileA
CreateDirectoryA
GetFileAttributesA
GetVersionExA
GetModuleFileNameA
DeviceIoControl
GetShortPathNameA
GetCurrentProcess
SetPriorityClass
CreateFileA
LockResource
SizeofResource
LoadResource
FindResourceA
CloseHandle
LoadLibraryA
GetProcAddress
TerminateProcess
OpenProcess
WaitForSingleObject
FreeLibrary
GetSystemTime
LocalFree
OutputDebugStringA
GetTimeZoneInformation
FormatMessageA
GetVersion
CompareStringA
lstrcmpiW
lstrcmpiA
GetLastError
InterlockedExchange
GetStringTypeExA
lstrlenW
MultiByteToWideChar
CompareStringW
GetEnvironmentVariableA
GetStringTypeExW
WideCharToMultiByte
lstrlenA
GetEnvironmentVariableW
GetCurrentDirectoryA
user32
PostQuitMessage
SetCursor
ShowOwnedPopups
DeleteMenu
DestroyIcon
EndDialog
GetNextDlgTabItem
CreateDialogIndirectParamA
GetDialogBaseUnits
DestroyMenu
GetMenuItemInfoA
InflateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
LoadIconA
WinHelpA
IsChild
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
SetActiveWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
TrackPopupMenuEx
TrackPopupMenu
SetScrollRange
GetScrollRange
SetForegroundWindow
ShowScrollBar
UpdateWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
DeferWindowPos
CopyRect
GetScrollInfo
SetScrollInfo
SetWindowPlacement
DefWindowProcA
CallWindowProcA
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
EndPaint
BeginPaint
GetWindowDC
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
SetWindowPos
ScrollWindowEx
ShowWindow
MoveWindow
SetWindowLongA
IsWindow
IsDialogMessageA
IsDlgButtonChecked
SetDlgItemTextA
SetDlgItemInt
SendDlgItemMessageA
GetDlgItemTextA
GetDlgItemInt
GetDlgItem
CheckRadioButton
CheckDlgButton
SetScrollPos
SetFocus
GetFocus
ClientToScreen
GetDlgCtrlID
CharUpperW
CharLowerA
CharLowerW
CharUpperA
GetWindowThreadProcessId
PostMessageA
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
UnregisterClassA
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
EnumWindows
FindWindowExA
SendMessageTimeoutA
RegisterWindowMessageA
GetWindow
FindWindowA
GetDesktopWindow
MessageBoxA
GetWindowTextA
RemoveMenu
GetSubMenu
GetMenuItemCount
InsertMenuA
GetMenuItemID
AppendMenuA
GetMenuStringA
GetMenuState
GetSystemMetrics
EnableWindow
IsWindowEnabled
GetCursorPos
ValidateRect
GetWindowTextLengthA
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
GetScrollPos
gdi32
ModifyWorldTransform
SetMapMode
GetClipBox
DeleteDC
CreateDIBPatternBrushPt
CreatePatternBrush
CreateBitmap
CreateCompatibleDC
GetStockObject
SelectPalette
PlayMetaFileRecord
GetObjectType
EnumMetaFile
PlayMetaFile
SetWorldTransform
ExtCreatePen
CreateSolidBrush
CreateHatchBrush
GetDCOrgEx
CreateFontIndirectA
CreateRectRgnIndirect
SetRectRgn
CombineRgn
GetMapMode
PolyBezierTo
PatBlt
DPtoLP
GetTextExtentPoint32A
GetTextMetricsA
SetGraphicsMode
SetTextColor
SetStretchBltMode
SetROP2
SetPolyFillMode
SetBkMode
SetBkColor
RestoreDC
SaveDC
DeleteObject
CreateDCA
CopyMetaFileA
CreatePen
GetDeviceCaps
PolylineTo
PolyDraw
ArcTo
GetCurrentPositionEx
ScaleWindowExtEx
SetWindowExtEx
OffsetWindowOrgEx
SetWindowOrgEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
StartDocA
GetPixel
BitBlt
GetWindowExtEx
GetViewportExtEx
GetObjectA
SelectClipPath
CreateRectRgn
GetClipRgn
SelectClipRgn
SetColorAdjustment
SetArcDirection
SetMapperFlags
SetTextCharacterExtra
SetTextJustification
SetTextAlign
MoveToEx
LineTo
OffsetClipRgn
IntersectClipRect
ExcludeClipRect
ExtSelectClipRgn
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueA
RegEnumKeyA
RegCreateKeyExA
RegOpenKeyA
RegSetValueA
RegDeleteValueA
RegSetValueExA
RegDeleteKeyA
SetNamedSecurityInfoA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyA
ole32
CoTreatAsClass
StringFromCLSID
ReadClassStg
ReadFmtUserTypeStg
OleRegGetUserType
CreateBindCtx
WriteFmtUserTypeStg
SetConvertStg
CoTaskMemFree
StringFromIID
CoGetMalloc
ReleaseStgMedium
CoTaskMemAlloc
OleDuplicateData
CoDisconnectObject
CoCreateInstance
StringFromGUID2
CLSIDFromString
WriteClassStg
oleaut32
VariantTimeToSystemTime
SysAllocStringLen
SysFreeString
SysStringLen
SysAllocStringByteLen
SysStringByteLen
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetElemsize
SafeArrayGetDim
SafeArrayCreate
VariantClear
SafeArrayRedim
VariantChangeType
VariantCopy
SafeArrayAllocData
SafeArrayAllocDescriptor
SafeArrayCopy
SafeArrayGetElement
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayLock
SafeArrayUnlock
SafeArrayDestroy
SafeArrayDestroyData
SafeArrayDestroyDescriptor
VariantInit
SystemTimeToVariantTime
SysReAllocStringLen
VarDateFromStr
VarBstrFromCy
VarBstrFromDec
VarDecFromStr
VarCyFromStr
VarBstrFromDate
Sections
.text Size: 436KB - Virtual size: 435KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ