Static task
static1
Behavioral task
behavioral1
Sample
b3eb8811adf4d7a927621cb1395aa082f2cd779ff39b1cecaa6c11a6dd018f7e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b3eb8811adf4d7a927621cb1395aa082f2cd779ff39b1cecaa6c11a6dd018f7e.exe
Resource
win10v2004-20221111-en
General
-
Target
b3eb8811adf4d7a927621cb1395aa082f2cd779ff39b1cecaa6c11a6dd018f7e
-
Size
448KB
-
MD5
473cf4afb4403d5daf610df24275a467
-
SHA1
b54543da19a0bada074307b40f2ab8e5fef963c6
-
SHA256
b3eb8811adf4d7a927621cb1395aa082f2cd779ff39b1cecaa6c11a6dd018f7e
-
SHA512
3e707b3e4b316c474f65504145e09842557a0aa87680ced9617c58fe9771061bde275fc61e800e1dc7a79f6d06254d239580cb122a770862cd6d6de08a8d1eae
-
SSDEEP
6144:OH1PltTFSBe+nvscVGCePeBOZj8Oo4Rv8Ewd5Qgr1kZeVEjf/IeqiM8vXZhuR80C:g1NBSyeYZwj4Rv8Pcb/eMlTV
Malware Config
Signatures
Files
-
b3eb8811adf4d7a927621cb1395aa082f2cd779ff39b1cecaa6c11a6dd018f7e.exe windows x86
02d2e59e1c889ea6d498c2a585ab7dc1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetOpenEnumW
WNetEnumResourceW
netapi32
DsGetDcNameW
NetApiBufferFree
DsRoleGetPrimaryDomainInformation
DsRoleFreeMemory
kernel32
GlobalAddAtomW
GetModuleHandleA
GetVersionExA
LoadLibraryA
GlobalFindAtomW
ReadFile
WriteFile
GlobalFlags
FlushFileBuffers
SetEndOfFile
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoA
HeapReAlloc
RtlUnwind
RaiseException
ExitProcess
HeapSize
GetCPInfo
GetACP
GetOEMCP
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
Sleep
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
VirtualAlloc
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
WritePrivateProfileStringW
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
GetCurrentProcessId
GetThreadLocale
InterlockedDecrement
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
GetModuleFileNameW
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
LoadLibraryW
InterlockedExchange
lstrcmpW
GlobalDeleteAtom
GetModuleHandleW
GetProcAddress
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
SetLastError
lstrlenW
WideCharToMultiByte
LocalFree
CloseHandle
FindNextFileW
LockResource
LocalAlloc
FindClose
GetLastError
MultiByteToWideChar
CreateFileW
GetVersionExW
FormatMessageW
SizeofResource
GetCurrentProcess
LoadLibraryExW
LoadResource
FreeLibrary
FindResourceW
FindFirstFileW
SetFilePointer
advapi32
InitializeAcl
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegSetValueExW
RegQueryValueExW
RegOpenKeyW
RegCloseKey
ConvertSecurityDescriptorToStringSecurityDescriptorW
ConvertSidToStringSidW
AdjustTokenPrivileges
RegEnumKeyExW
SetSecurityDescriptorSacl
GetLengthSid
IsValidSecurityDescriptor
AddAce
RegOpenKeyExW
IsValidSid
SetEntriesInAclW
ConvertStringSecurityDescriptorToSecurityDescriptorW
AddAccessAllowedAce
SetSecurityDescriptorOwner
SetKernelObjectSecurity
IsValidAcl
OpenProcessToken
SetSecurityDescriptorControl
DeleteAce
SetSecurityDescriptorGroup
MapGenericMask
GetKernelObjectSecurity
GetAclInformation
CopySid
RegCreateKeyExW
GetSecurityDescriptorControl
EqualSid
InitializeSecurityDescriptor
ConvertStringSidToSidW
LookupAccountNameW
SetSecurityDescriptorDacl
SetNamedSecurityInfoW
LookupPrivilegeValueW
GetAce
LookupAccountSidW
RegConnectRegistryW
GetNamedSecurityInfoW
MakeAbsoluteSD
shlwapi
PathFindExtensionW
oleacc
CreateStdAccessibleObject
LresultFromObject
user32
DestroyMenu
UnregisterClassA
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
DefWindowProcW
CallWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetWindowPos
ShowWindow
SetWindowLongW
IsWindow
GetDlgItem
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
SetWindowTextW
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
RegisterWindowMessageW
LoadIconW
WinHelpW
EnableMenuItem
CheckMenuItem
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
GetActiveWindow
IsWindowVisible
GetCapture
GetClassLongW
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
PostQuitMessage
PostMessageW
UnhookWindowsHookEx
GetWindowTextW
MessageBoxW
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongW
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
LoadCursorW
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowThreadProcessId
SendMessageW
GetParent
ModifyMenuW
gdi32
GetStockObject
DeleteDC
ScaleWindowExtEx
SetTextColor
SetMapMode
GetClipBox
SetWindowExtEx
SetBkColor
RestoreDC
SaveDC
DeleteObject
CreateBitmap
GetDeviceCaps
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 220KB - Virtual size: 218KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
PACK Size: 144KB - Virtual size: 380KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE