Static task
static1
Behavioral task
behavioral1
Sample
b2a9a20722b60bbf23bf1fa209d2a84e0193268f43d521303ad8b85c00fa7c6c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b2a9a20722b60bbf23bf1fa209d2a84e0193268f43d521303ad8b85c00fa7c6c.exe
Resource
win10v2004-20220901-en
General
-
Target
b2a9a20722b60bbf23bf1fa209d2a84e0193268f43d521303ad8b85c00fa7c6c
-
Size
573KB
-
MD5
3650a0e09a69584ada748565d93a2638
-
SHA1
736de3a49a1f3d15b0b63249745195b14fab46f7
-
SHA256
b2a9a20722b60bbf23bf1fa209d2a84e0193268f43d521303ad8b85c00fa7c6c
-
SHA512
381401a8fe37f08740f2d2bb68a8b5884b7765a3ddd6e8ade0eb742cdc8084cee534df9e4bbd8cce20ebf40ee2110b35f506f6e54d58113a73e447b049417329
-
SSDEEP
12288:K+SYSxuZ5q9YmWSUzeAiimxvrlJrzUy48wDT3jQGJOp65S:dhSzFF7kj8wDbjQcOp65S
Malware Config
Signatures
Files
-
b2a9a20722b60bbf23bf1fa209d2a84e0193268f43d521303ad8b85c00fa7c6c.exe windows x86
9fdf4f5e8e81a30d4266710bbb8ca2a3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceExW
WritePrivateProfileStructA
RaiseException
LCMapStringA
VirtualQueryEx
_llseek
FreeLibraryAndExitThread
IsBadWritePtr
_hread
DeleteFiber
GlobalFindAtomW
GetSystemInfo
GetShortPathNameW
VirtualQuery
SetTimeZoneInformation
GetProfileIntA
FlushFileBuffers
GetSystemDefaultLangID
CreateIoCompletionPort
CreateMutexW
WriteProcessMemory
SetNamedPipeHandleState
InitializeCriticalSection
EnumSystemCodePagesA
GlobalReAlloc
CreateEventA
CompareStringA
GetUserDefaultLangID
GetAtomNameA
LocalAlloc
CreateProcessA
SetConsoleOutputCP
ReadDirectoryChangesW
SetStdHandle
IsProcessorFeaturePresent
GlobalGetAtomNameW
GetModuleFileNameW
GetStartupInfoA
LeaveCriticalSection
GetCommandLineW
OpenMutexA
FindResourceExA
WritePrivateProfileSectionA
WritePrivateProfileSectionW
RemoveDirectoryA
EnumDateFormatsW
SetSystemTime
SetCommTimeouts
FreeLibrary
LocalReAlloc
SetConsoleWindowInfo
GetDriveTypeA
GetPrivateProfileStringW
GetSystemTime
ConnectNamedPipe
CreateMutexA
GetACP
LocalSize
FatalAppExitA
FreeResource
GlobalUnlock
SetHandleCount
DuplicateHandle
_lopen
GetCompressedFileSizeW
lstrcpynA
WriteFile
CreatePipe
GetProcessHeap
lstrcatW
GetFileInformationByHandle
SetMailslotInfo
GetThreadPriority
SetEvent
GetNumberFormatW
SetConsoleMode
IsBadReadPtr
ExitProcess
user32
DrawFocusRect
EnumDesktopsA
GetForegroundWindow
gdi32
SetMetaFileBitsEx
GetCurrentObject
PolyDraw
CopyMetaFileW
OffsetViewportOrgEx
CreateDCW
GetGlyphOutlineW
advapi32
GetServiceKeyNameW
SetSecurityDescriptorGroup
CryptAcquireContextA
EnumServicesStatusW
RegSaveKeyW
LockServiceDatabase
RevertToSelf
LogonUserA
NotifyChangeEventLog
CryptDestroyKey
RegQueryInfoKeyA
MakeAbsoluteSD
CryptGetHashParam
RegQueryValueExW
EnumDependentServicesA
DuplicateToken
GetSidSubAuthorityCount
BuildTrusteeWithNameW
DeregisterEventSource
OpenSCManagerA
QueryServiceConfigW
SetEntriesInAclA
RegEnumKeyExW
AllocateLocallyUniqueId
QueryServiceConfigA
CryptAcquireContextW
shell32
SHLoadInProc
FindExecutableW
Shell_NotifyIconA
FindExecutableA
ExtractIconExW
ole32
OleSetMenuDescriptor
OleBuildVersion
CoGetInterfaceAndReleaseStream
CoTreatAsClass
OleRegGetMiscStatus
WriteClassStg
CoFreeUnusedLibraries
ReadClassStg
OleCreateMenuDescriptor
OleConvertIStorageToOLESTREAM
oleaut32
LoadTypeLibEx
VariantChangeType
comctl32
CreatePropertySheetPageW
ImageList_SetIconSize
shlwapi
PathIsDirectoryA
PathRemoveFileSpecW
PathIsRelativeA
PathAppendW
UrlCombineW
StrDupW
StrRetToStrW
PathFileExistsW
Sections
.text Size: 10KB - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 256KB - Virtual size: 255KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ