Static task
static1
Behavioral task
behavioral1
Sample
b4bf72a113efc6f95ced0e1d57c73a9f6f940892b335f248d6fbdbec2e4b2f97.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b4bf72a113efc6f95ced0e1d57c73a9f6f940892b335f248d6fbdbec2e4b2f97.exe
Resource
win10v2004-20221111-en
General
-
Target
b4bf72a113efc6f95ced0e1d57c73a9f6f940892b335f248d6fbdbec2e4b2f97
-
Size
192KB
-
MD5
91b2fb18c2d7c2bfee1de9374850e79d
-
SHA1
f925de91c91a0e296774a04da4aa6298446a2618
-
SHA256
b4bf72a113efc6f95ced0e1d57c73a9f6f940892b335f248d6fbdbec2e4b2f97
-
SHA512
ebb4fe0d5773d41ec94f53df874a216e2a338d95de76545ca803a843cdc5edb3419d439ac90dbff6b3cb851e11ba7ac196f1226081133217d555980cdfca6359
-
SSDEEP
3072:6SnWdIetBj1kqG28IdOfA6T8G6APzqMdW7AVg2PRo4na2l5LMD8:6/dxktGKAbEIAZS8
Malware Config
Signatures
Files
-
b4bf72a113efc6f95ced0e1d57c73a9f6f940892b335f248d6fbdbec2e4b2f97.exe windows x86
10afaaaf63bfbdb97cf2a3cacb6870a5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
FreeLibrary
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetLocalTime
ExitProcess
TerminateProcess
HeapFree
GetACP
SetStdHandle
GetFileType
RaiseException
HeapReAlloc
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetStartupInfoA
GetEnvironmentVariableA
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetDriveTypeA
Sleep
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetFileTime
GetFileSize
GetFullPathNameA
GetVolumeInformationA
LoadLibraryA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
GetProcAddress
GetCurrentDirectoryA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
GlobalHandle
GlobalUnlock
GlobalFree
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
CloseHandle
FileTimeToLocalFileTime
InterlockedExchange
FileTimeToSystemTime
FindNextFileA
FindFirstFileA
GetLastError
SetLastError
FindClose
lstrcpynA
lstrcpyA
lstrcatA
SetErrorMode
LocalFree
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
HeapCreate
HeapAlloc
HeapDestroy
GetTempPathA
DeleteFileA
CopyFileA
GetShortPathNameA
WaitForSingleObject
MoveFileA
WinExec
GetFileAttributesA
SetFileAttributesA
MultiByteToWideChar
lstrlenA
WritePrivateProfileStringA
GetModuleFileNameA
GetSystemDirectoryA
GetCommandLineA
GetModuleHandleA
FreeEnvironmentStringsW
GetVersionExA
user32
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
LoadIconA
ShowWindow
LoadCursorA
GetSysColorBrush
DestroyMenu
GetClassInfoA
RegisterClassA
GetMenu
GetSubMenu
GetMenuItemID
GetDlgItem
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetSystemMetrics
CharUpperA
LoadStringA
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
UnhookWindowsHookEx
GetLastActivePopup
IsWindowEnabled
MessageBoxA
EnableWindow
GetWindowTextA
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetWindowLongA
GetClassNameA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
PostQuitMessage
PostMessageA
GetTopWindow
GetCapture
RemovePropA
GetParent
GetNextDlgTabItem
SetCursor
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
SendMessageA
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
wsprintfA
WinHelpA
gdi32
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
GetDeviceCaps
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
CreateBitmap
DeleteObject
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyExA
OpenSCManagerA
CloseServiceHandle
OpenServiceA
DeleteService
AllocateAndInitializeSid
RegDeleteKeyA
RegEnumKeyExA
InitializeAcl
LookupAccountNameA
AddAccessAllowedAce
SetNamedSecurityInfoA
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
shell32
ShellExecuteExA
SHChangeNotify
comctl32
ord17
ole32
CoUninitialize
CoInitialize
CoCreateInstance
wininet
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
FindCloseUrlCache
Sections
.text Size: 136KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ