Static task
static1
Behavioral task
behavioral1
Sample
b469bf6f3cffc6ebc1448744adf298c97b2d970b23c220943a3e9327202166ab.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b469bf6f3cffc6ebc1448744adf298c97b2d970b23c220943a3e9327202166ab.exe
Resource
win10v2004-20221111-en
General
-
Target
b469bf6f3cffc6ebc1448744adf298c97b2d970b23c220943a3e9327202166ab
-
Size
429KB
-
MD5
e7e88c89b74034e8164640db5bd406c7
-
SHA1
b1464e8ffe65265f60bce1119c58834448bc91cd
-
SHA256
b469bf6f3cffc6ebc1448744adf298c97b2d970b23c220943a3e9327202166ab
-
SHA512
7157c65fee6867c57863e8f6447374d284d2d75d8211b29fe23282075f09dc6c59ce763d46b515fb43e08e845df36346799fae9dac4570f565bef92d6bb588aa
-
SSDEEP
1536:cHb2FTOaRIrHRgl7D7AFysbP0DOIqxLcakr/6W4j752aR1p/WVHJq:c72Bmxu/A4sD0DOb4aM4Bhh2HY
Malware Config
Signatures
Files
-
b469bf6f3cffc6ebc1448744adf298c97b2d970b23c220943a3e9327202166ab.exe windows x86
14fa971627c9a89a7158655309685ac2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeConsole
GetProcAddress
CloseHandle
GetFullPathNameA
OpenProcess
GetVersion
GetVolumePathNameW
GlobalMemoryStatusEx
ExitProcess
LoadLibraryExW
OpenMutexA
GetLocaleInfoA
OpenEventA
GetPrivateProfileStringW
GetDiskFreeSpaceExW
CreateToolhelp32Snapshot
FindNextVolumeW
GetUserDefaultUILanguage
WriteProcessMemory
GetCommandLineW
GlobalGetAtomNameA
CreateFiber
GetCurrentProcess
GetModuleHandleA
CreateFileA
GetPrivateProfileSectionNamesW
Process32First
DeleteCriticalSection
GlobalDeleteAtom
ReadProcessMemory
FlushFileBuffers
LoadModule
GetModuleFileNameA
GetProcAddress
FindNextFileW
Process32Next
LoadLibraryA
GetEnvironmentStringsW
CopyFileW
GetFileTime
HeapReAlloc
user32
DdeConnect
TranslateMessage
CallWindowProcA
CharUpperW
GetKeyboardLayoutList
AppendMenuA
GetMessageA
DispatchMessageA
GetMenuState
DefWindowProcA
EndDeferWindowPos
CreateWindowExA
ClientToScreen
DdeFreeStringHandle
CallMsgFilterW
CharToOemA
DdeQueryConvInfo
DrawFrameControl
CreateIconIndirect
FillRect
GetFocus
CreateDialogIndirectParamW
DdeCreateStringHandleW
GetDlgItemTextA
DrawMenuBar
GetWindowRgn
CallNextHookEx
GetGUIThreadInfo
GetCaretPos
ShowWindow
GetParent
GetMessagePos
UpdateWindow
CreateCaret
GetDCEx
RegisterClassExA
BeginPaint
ChildWindowFromPoint
CreateAcceleratorTableA
DeleteMenu
advapi32
CryptGetHashParam
RegNotifyChangeKeyValue
GetSecurityDescriptorGroup
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
RegEnumKeyA
CryptGetProvParam
GetSecurityDescriptorLength
SetSecurityInfo
QueryServiceConfigA
shell32
ShellExecuteEx
StrCmpNIA
DragQueryPoint
StrRChrA
RealShellExecuteExW
SHAppBarMessage
SHCreateDirectoryExW
DragFinish
SHGetFolderLocation
InternalExtractIconListW
ExtractAssociatedIconW
SHGetDesktopFolder
SHExtractIconsW
DragQueryFileW
RealShellExecuteA
SHGetPathFromIDListW
SHGetSpecialFolderLocation
DragAcceptFiles
StrRStrA
OpenAs_RunDLLA
gdi32
SetROP2
GetObjectType
GetObjectW
CreateHatchBrush
ExtCreateRegion
GetCharABCWidthsW
MoveToEx
FlattenPath
PolyBezierTo
Sections
.text Size: 120KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 212KB - Virtual size: 212KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE