Static task
static1
Behavioral task
behavioral1
Sample
b57d4b62f64e88c10c951052acda902dbe98ca43e9bb967d50e3a67634782be4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b57d4b62f64e88c10c951052acda902dbe98ca43e9bb967d50e3a67634782be4.exe
Resource
win10v2004-20220812-en
General
-
Target
b57d4b62f64e88c10c951052acda902dbe98ca43e9bb967d50e3a67634782be4
-
Size
814KB
-
MD5
3d22dd156fcfd91044da9413a98fce61
-
SHA1
70248f9a979e6a5b8ffb872053b8d0312086fbf6
-
SHA256
b57d4b62f64e88c10c951052acda902dbe98ca43e9bb967d50e3a67634782be4
-
SHA512
7d94a8737e62653aa24e6265037839320bb9992c6b0ec1d715b1d4c1b998cf00c4e9e428ea2cca4a9ca656d7cf428531889888ab235a50149d0033f36e240046
-
SSDEEP
12288:Aa5fw3/NPBAuxlVtD751epm+CIQctBg5soMLa:Vfw3/NPBAuxlVtD11emnZ9
Malware Config
Signatures
Files
-
b57d4b62f64e88c10c951052acda902dbe98ca43e9bb967d50e3a67634782be4.exe windows x86
c2ce769cea865ed2e612cd8f880e6bdd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetGetConnectedState
InternetCloseHandle
HttpSendRequestA
HttpOpenRequestA
InternetAttemptConnect
InternetConnectA
InternetOpenA
urlmon
URLDownloadToFileA
winmm
timeGetTime
kernel32
LoadLibraryA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
WideCharToMultiByte
RaiseException
GetLastError
InitializeCriticalSection
DeleteCriticalSection
lstrcmpiA
lstrlenW
lstrlenA
CompareStringA
CompareStringW
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetProcessHeap
GetModuleFileNameA
WriteProcessMemory
VirtualProtectEx
ReadProcessMemory
OpenProcess
GetCurrentProcessId
GetVolumeInformationA
ReadFile
GetFileSize
CreateThread
GetCurrentThreadId
TerminateProcess
GetExitCodeProcess
SuspendThread
ResumeThread
CreateProcessA
SetCurrentDirectoryA
ExitProcess
CopyFileA
MulDiv
HeapAlloc
FlushInstructionCache
GetCurrentProcess
GlobalUnlock
GlobalLock
GlobalAlloc
lstrcmpA
GetModuleHandleA
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcpynA
IsDBCSLeadByte
CreateDirectoryA
GetTempPathA
GetProcAddress
SetFilePointer
SetFileAttributesA
SetFileTime
SystemTimeToFileTime
FindClose
FindFirstFileA
SetEndOfFile
GetTickCount
WaitForSingleObject
SetEvent
CreateEventA
GetFullPathNameA
RemoveDirectoryA
FindNextFileA
GlobalMemoryStatus
SetPriorityClass
GetPriorityClass
GetComputerNameA
GetSystemInfo
GetFileAttributesA
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
SetUnhandledExceptionFilter
TlsGetValue
TlsSetValue
TlsFree
SetLastError
TlsAlloc
QueryPerformanceCounter
GetCommandLineA
GetStartupInfoA
GetDateFormatA
GetTimeFormatA
HeapReAlloc
VirtualQuery
VirtualAlloc
VirtualProtect
RtlUnwind
GetSystemTimeAsFileTime
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetOEMCP
GetCPInfo
GetStringTypeA
GetStringTypeW
GetStdHandle
UnhandledExceptionFilter
FreeLibrary
CreateFileA
Sleep
DeleteFileA
CloseHandle
InterlockedDecrement
InterlockedIncrement
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetUserDefaultLCID
FreeEnvironmentStringsA
GetEnvironmentStrings
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
IsBadReadPtr
IsBadCodePtr
SetStdHandle
FlushFileBuffers
GetLocaleInfoW
WriteFile
SetEnvironmentVariableA
user32
SetWindowPos
DestroyWindow
RedrawWindow
IsWindow
SendMessageA
DestroyAcceleratorTable
GetFocus
IsChild
GetWindow
GetClassNameA
BeginPaint
EndPaint
CallWindowProcA
GetDesktopWindow
InvalidateRgn
GetClientRect
SetCapture
ReleaseCapture
GetParent
CharNextA
CreateAcceleratorTableA
LoadCursorA
CreateWindowExA
SetFocus
GetSysColor
GetDlgItem
MoveWindow
GetKeyState
DefWindowProcA
SetTimer
KillTimer
WaitForInputIdle
EnumThreadWindows
SetWindowTextA
UpdateWindow
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
SystemParametersInfoA
PostMessageA
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
RegisterWindowMessageA
GetWindowTextLengthA
GetWindowTextA
RegisterClassExA
FillRect
GetClassInfoExA
SetForegroundWindow
InvalidateRect
GetWindowRect
GetDC
ReleaseDC
GetWindowPlacement
IsWindowVisible
SetWindowPlacement
MessageBoxA
GetWindowLongA
SetWindowLongA
UnregisterClassA
ShowWindow
wsprintfA
GetSystemMetrics
gdi32
CreateSolidBrush
GetStockObject
GetObjectA
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
GetDeviceCaps
DeleteObject
comdlg32
GetOpenFileNameA
advapi32
RegCloseKey
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyExA
RegEnumKeyA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
RegDeleteKeyA
shell32
SHGetSpecialFolderPathA
ExtractIconExA
SHFileOperationA
ShellExecuteA
ole32
CoCreateInstance
OleInitialize
StringFromGUID2
OleUninitialize
CoTaskMemAlloc
OleLockRunning
CreateStreamOnHGlobal
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
CoTaskMemFree
CoTaskMemRealloc
oleaut32
LoadTypeLi
LoadRegTypeLi
VariantInit
VariantClear
OleCreateFontIndirect
SysStringByteLen
SysStringLen
SysAllocString
SysAllocStringLen
SysFreeString
VarUI4FromStr
Sections
.text Size: 308KB - Virtual size: 305KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 404KB - Virtual size: 403KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zylmix Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE