Static task
static1
Behavioral task
behavioral1
Sample
b5cee207e077941c358491d308a550d726b6bdc0e40a90320ccd02b372a99711.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b5cee207e077941c358491d308a550d726b6bdc0e40a90320ccd02b372a99711.exe
Resource
win10v2004-20220812-en
General
-
Target
b5cee207e077941c358491d308a550d726b6bdc0e40a90320ccd02b372a99711
-
Size
388KB
-
MD5
a5fd77af0e63fa93385b259b66f7c079
-
SHA1
47c4be7fe679e2bd77c64c0395d6dd1b2ef413c1
-
SHA256
b5cee207e077941c358491d308a550d726b6bdc0e40a90320ccd02b372a99711
-
SHA512
07c5b923128293072cbed2416385dd3e158e49d38b45ad889c08b943e4ef50b86226c02cda93055bb4d2c6adf798d209083efeadd309821f49bf6aa8489685a6
-
SSDEEP
6144:FPZsDyNGNDP0l5Cub+Yv6MxPdxR5iprGH6g/g0CNmydE1aybxXp:ZGDPC5Cubtv66F/0GJI0kEQy
Malware Config
Signatures
Files
-
b5cee207e077941c358491d308a550d726b6bdc0e40a90320ccd02b372a99711.exe windows x86
c3eaff5cd5d61b48e4e57821c2b62783
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteW
SHGetPathFromIDListW
SHGetMalloc
SHGetFolderPathW
shlwapi
UrlGetPartW
StrToIntExW
StrStrIW
StrRChrW
StrCmpW
StrCmpIW
StrChrW
PathStripToRootW
PathIsRelativeW
PathFindExtensionW
PathIsUNCW
PathRemoveBackslashW
PathIsRootW
oleaut32
SysAllocString
SysStringLen
VarR8FromI1
VariantClear
VariantInit
SysFreeString
setupapi
SetupDiOpenDevRegKey
SetupDiInstallDriverFiles
SetupDiGetDriverInstallParamsW
SetupDiGetDeviceRegistryPropertyW
SetupDiGetDeviceInstanceIdW
SetupDiGetDeviceInstallParamsW
SetupDiGetClassDevsW
SetupDiEnumDriverInfoW
SetupDiOpenDeviceInfoW
SetupDiDestroyDeviceInfoList
SetupDiCreateDeviceInfoList
SetupDiBuildDriverInfoList
SetupCloseInfFile
SetupCloseFileQueue
CM_Locate_DevNodeW
CM_Get_DevNode_Status
CM_Get_DevNode_Registry_PropertyW
SetupDiSetDeviceInstallParamsW
SetupDiSetSelectedDriverW
SetupFindFirstLineW
SetupGetStringFieldW
SetupOpenFileQueue
SetupScanFileQueueW
SetupOpenInfFileW
SetupDiEnumDeviceInfo
kernel32
Sleep
SystemTimeToFileTime
UnhandledExceptionFilter
UnmapViewOfFile
GetProcAddress
SetUnhandledExceptionFilter
SetFileTime
lstrlenW
lstrlenA
lstrcpynW
lstrcmpiW
lstrcmpW
WriteFile
WideCharToMultiByte
WaitForSingleObject
SetFilePointer
SetFileAttributesW
SetEvent
SetEndOfFile
ResetEvent
RemoveDirectoryW
ReleaseMutex
ReadFile
QueryPerformanceCounter
MultiByteToWideChar
MoveFileW
MapViewOfFile
LocalFree
LoadLibraryExW
LeaveCriticalSection
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
InterlockedCompareExchange
InitializeCriticalSection
HeapReAlloc
HeapFree
HeapAlloc
GlobalFree
GlobalAlloc
GetVolumeInformationW
GetVersionExW
GetUserDefaultLangID
GetTickCount
GetSystemTimeAsFileTime
GetSystemTime
GetSystemInfo
GetProcessHeap
CloseHandle
CompareFileTime
CompareStringA
CompareStringW
CreateDirectoryW
CreateEventW
CreateFileW
CreateMutexW
CreateProcessW
CreateThread
DeleteCriticalSection
DeleteFileW
DisableThreadLibraryCalls
EnterCriticalSection
FindNextFileW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDriveTypeW
GetExitCodeProcess
GetExitCodeThread
GetFileSize
GetFileTime
GetFileType
GetLocalTime
GetLocaleInfoW
WaitForMultipleObjects
user32
DispatchMessageW
GetActiveWindow
GetKeyboardType
MsgWaitForMultipleObjects
PeekMessageW
PostMessageW
SendMessageW
TranslateMessage
CharUpperW
CharUpperA
CharNextW
CharLowerA
ExitWindowsEx
msvfw32
ICCompressorFree
ole32
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
CoInitialize
crypt32
CryptHashPublicKeyInfo
CertGetCertificateContextProperty
wininet
InternetCanonicalizeUrlW
InternetQueryOptionA
InternetGetConnectedState
InternetCrackUrlW
Sections
.text Size: 296KB - Virtual size: 296KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ