Static task
static1
Behavioral task
behavioral1
Sample
b27af69c789ccaad7a0cbe6fe9faf16223a7df4bc86061daa9ad6864236b050b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b27af69c789ccaad7a0cbe6fe9faf16223a7df4bc86061daa9ad6864236b050b.exe
Resource
win10v2004-20221111-en
General
-
Target
b27af69c789ccaad7a0cbe6fe9faf16223a7df4bc86061daa9ad6864236b050b
-
Size
248KB
-
MD5
af61d462fc7b19d57dee0cce4124468a
-
SHA1
69cf87db6281fb0178e0cede0966327faef1a076
-
SHA256
b27af69c789ccaad7a0cbe6fe9faf16223a7df4bc86061daa9ad6864236b050b
-
SHA512
76535f6961a696a32eb7203b092ce52305e1215b28e512b2efe92b045e2ec40cb2313b54f653c64e82fb03b9ad397c43ccd6a8747606f703df790f5ba0279bcb
-
SSDEEP
6144:NrxawHaga2jRTwx3poBec/RZjpGSeTH+t:NdfL9TskP7jpyH
Malware Config
Signatures
Files
-
b27af69c789ccaad7a0cbe6fe9faf16223a7df4bc86061daa9ad6864236b050b.exe windows x86
a6a2869df543a582e31576987b50658e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DebugActiveProcess
ResumeThread
GetThreadContext
SuspendThread
TerminateProcess
GetExitCodeProcess
CreateProcessA
GetModuleFileNameA
GetStartupInfoA
GetShortPathNameA
DeleteFileA
Sleep
GetTempPathA
FindClose
FindNextFileA
FindFirstFileA
UnmapViewOfFile
FreeLibrary
CloseHandle
WaitForSingleObject
GetCurrentThread
GetVersionExA
VirtualProtectEx
SetThreadContext
ReadFile
ReleaseMutex
LoadLibraryA
MapViewOfFile
CreateFileMappingA
CreateMutexA
SetFilePointer
GetCurrentProcessId
SleepEx
CreateThread
WriteFile
GetTempFileNameA
CreateMailslotA
SetEnvironmentVariableA
GetCommandLineA
GetModuleHandleA
GetFileSize
SetThreadPriority
GetCurrentProcess
SetPriorityClass
WaitForDebugEvent
ContinueDebugEvent
GetLastError
ReadProcessMemory
CreateFileA
GetProcAddress
CompareStringA
WriteProcessMemory
GetEnvironmentVariableA
CompareStringW
GetVersion
GetLocalTime
FlushFileBuffers
LCMapStringW
LCMapStringA
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
RtlUnwind
GetSystemTimeAsFileTime
GetTimeZoneInformation
GetSystemTime
FreeEnvironmentStringsA
FreeEnvironmentStringsW
ExitProcess
HeapFree
HeapAlloc
UnhandledExceptionFilter
user32
EnumWindows
SendMessageTimeoutA
GetWindowThreadProcessId
DestroyWindow
SystemParametersInfoA
CreateDialogParamA
UpdateWindow
SetTimer
GetDlgItem
TranslateMessage
GetMessageA
SendMessageA
BeginPaint
EndPaint
LoadCursorA
GetSystemMetrics
ShowWindow
KillTimer
PostQuitMessage
DefWindowProcA
RegisterClassA
CreateWindowExA
MessageBoxA
SetWindowTextA
DispatchMessageA
gdi32
DeleteObject
DeleteDC
CreateDIBitmap
RealizePalette
SelectPalette
CreateDCA
CreatePalette
BitBlt
SelectObject
CreateCompatibleDC
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.jgd Size: - Virtual size: 1B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE