Static task
static1
Behavioral task
behavioral1
Sample
b6092736d6cdb1f211c07c9d2d434d60a116d99095dfd03386030a4a6ff937d8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b6092736d6cdb1f211c07c9d2d434d60a116d99095dfd03386030a4a6ff937d8.exe
Resource
win10v2004-20220901-en
General
-
Target
b6092736d6cdb1f211c07c9d2d434d60a116d99095dfd03386030a4a6ff937d8
-
Size
231KB
-
MD5
1a5a8edad9924c45225796368d740b60
-
SHA1
33e727dcfaa194abfefee416259359427c66b7f6
-
SHA256
b6092736d6cdb1f211c07c9d2d434d60a116d99095dfd03386030a4a6ff937d8
-
SHA512
d26d907c6fd5c3ff13004faee64c8de9f63ac61ab257c52d0e02f1c6f52ebd4abe147f4d9880d4c373964374c99d5307f1cf1a08f883fbc5ab5cf1728a79dcae
-
SSDEEP
6144:WKRPF4afU3dp4ee/CO+wvA3mlSxxLPoryWrONE:WYPF4f38egCO+alSxxLgryWrO
Malware Config
Signatures
Files
-
b6092736d6cdb1f211c07c9d2d434d60a116d99095dfd03386030a4a6ff937d8.exe windows x86
d5406a7878262a8917afafd43fdbc868
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
mmioAdvance
waveOutGetPitch
mixerOpen
timeGetSystemTime
user32
GetWindowLongA
GetMenuState
GetMenuItemID
ShowWindow
SetWindowLongA
PostQuitMessage
CopyRect
SetActiveWindow
IsDialogMessageA
LoadBitmapA
SetPropA
GetWindow
EndDialog
SetMenuItemBitmaps
PeekMessageA
GetKeyState
UnhookWindowsHookEx
GetSubMenu
CallWindowProcA
SetForegroundWindow
GetMenuItemCount
GetDlgCtrlID
GetWindowPlacement
IsWindowEnabled
GetSysColorBrush
GetMenuCheckMarkDimensions
GetTopWindow
SendDlgItemMessageA
IsWindow
ExitWindowsEx
GetWindowRect
UpdateWindow
DrawIcon
EndPaint
PtInRect
SetWindowPos
GrayStringA
GetMessageA
GetWindowTextLengthA
MessageBoxA
CallNextHookEx
GetWindowTextA
LoadStringA
GetMessagePos
CharUpperA
GetActiveWindow
WinHelpA
UnregisterClassA
RegisterClassA
SetWindowTextA
EnableMenuItem
SystemParametersInfoA
ReleaseDC
DestroyMenu
GetFocus
GetMenu
GetForegroundWindow
wsprintfA
CreateDialogIndirectParamA
GetLastActivePopup
CheckMenuItem
GetCapture
PostMessageA
TranslateMessage
LoadCursorA
MapWindowPoints
BeginPaint
GetClassInfoA
SendMessageA
EnableWindow
ClientToScreen
GetPropA
GetCursorPos
GetClassNameA
SetWindowsHookExA
GetSystemMetrics
GetSysColor
GetClientRect
GetDlgItem
DestroyWindow
LoadIconA
GetParent
IsWindowVisible
RemovePropA
GetDC
DefWindowProcA
ValidateRect
CreateWindowExA
gdi32
SaveDC
GetClipBox
RestoreDC
TextOutA
SetMapMode
DeleteObject
ExtTextOutA
GetDeviceCaps
GetRelAbs
DeleteDC
SetWindowExtEx
ScaleViewportExtEx
RoundRect
CreateDIBitmap
CreateEllipticRgn
SetViewportExtEx
CreateBitmap
kernel32
GetCurrentThread
SetStdHandle
DuplicateHandle
GetThreadLocale
GetStringTypeA
Beep
TlsGetValue
SetEnvironmentVariableA
GlobalFlags
lstrcpynA
FindResourceA
IsBadCodePtr
GetCurrentDirectoryA
InitializeCriticalSection
GetEnvironmentStringsA
FreeEnvironmentStringsA
LocalUnlock
LockResource
GetCommandLineA
LCMapStringA
lstrlenA
lstrcmpA
GetWindowsDirectoryA
GetFileAttributesA
CompareStringA
GetOEMCP
LCMapStringW
FileTimeToSystemTime
GetFullPathNameA
IsDebuggerPresent
SetLastError
Sleep
Toolhelp32ReadProcessMemory
GetACP
GetModuleHandleA
FindClose
FlushFileBuffers
GlobalFree
HeapCreate
GetTimeZoneInformation
GetStdHandle
LeaveCriticalSection
HeapAlloc
InterlockedDecrement
HeapReAlloc
lstrcmpiA
LocalFileTimeToFileTime
TlsSetValue
GetVersion
LocalReAlloc
GlobalLock
SetSystemTime
GetEnvironmentVariableA
GetModuleFileNameA
CreateFileA
SystemTimeToFileTime
EnterCriticalSection
RaiseException
TlsFree
SetConsoleCursorInfo
GlobalUnlock
ExitProcess
GetCurrentProcess
CompareStringW
WideCharToMultiByte
SetErrorMode
CloseHandle
IsValidLocale
LoadLibraryA
SystemTimeToTzSpecificLocalTime
GetFileSize
ClearCommError
FileTimeToLocalFileTime
RtlUnwind
GetVersionExA
SetUnhandledExceptionFilter
GetCPInfo
HeapFree
GetSystemDirectoryA
GetDriveTypeA
HeapSize
FindFirstFileA
MulDiv
HeapDestroy
GetFileType
ReadFile
LoadResource
InterlockedIncrement
DosDateTimeToFileTime
lstrcatA
InitializeSListHead
FindNextFileA
SetEndOfFile
IsBadWritePtr
SetFilePointer
GlobalGetAtomNameA
GetProcAddress
WriteFile
LocalAlloc
ReleaseActCtx
VirtualAlloc
GetEnvironmentStringsW
SetConsoleTextAttribute
GetCurrentThreadId
LocalFree
GetStringTypeW
IsBadReadPtr
SetCurrentDirectoryA
GetStartupInfoA
GlobalHandle
GlobalFindAtomA
GlobalAddAtomA
DeleteCriticalSection
GetLastError
GetProcessVersion
DeleteFileA
FreeEnvironmentStringsW
SetHandleCount
lstrcpyA
MultiByteToWideChar
FreeLibrary
VirtualFree
TlsAlloc
GetFileTime
UnhandledExceptionFilter
FlushInstructionCache
LockFile
UnlockFile
GlobalDeleteAtom
GetVolumeInformationA
SetFileAttributesA
GlobalAlloc
comdlg32
GetFileTitleA
advapi32
RegCloseKey
RegCreateKeyExA
AddUsersToEncryptedFile
LsaEnumeratePrivileges
SystemFunction016
LsaICLookupNamesWithCreds
OpenThreadToken
RegDeleteValueA
RegSetValueExA
RegOpenKeyExA
MSChapSrvChangePassword
AddAccessDeniedAceEx
LockServiceDatabase
SetSecurityDescriptorControl
GetAclInformation
Sections
.text Size: 203KB - Virtual size: 203KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ