Static task
static1
Behavioral task
behavioral1
Sample
b70680c83e94d7ccd8aed4d62e4ddfd7c39e7f47cfbb5319d88037998194a693.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b70680c83e94d7ccd8aed4d62e4ddfd7c39e7f47cfbb5319d88037998194a693.exe
Resource
win10v2004-20221111-en
General
-
Target
b70680c83e94d7ccd8aed4d62e4ddfd7c39e7f47cfbb5319d88037998194a693
-
Size
112KB
-
MD5
49d80eb6d7bb07ec52dd72e440944de1
-
SHA1
ec36ce2b860a57c9795c1f4560ae04e9121c338d
-
SHA256
b70680c83e94d7ccd8aed4d62e4ddfd7c39e7f47cfbb5319d88037998194a693
-
SHA512
5a1711e65094e90a51b1dc7b71640e2a4cce326dd90ac90f9268df594b5b98ef2ff1a7c488211145811efcc0c2175670f2fab3e85ef7cdc86820af6e4f2d452d
-
SSDEEP
3072:R+wHWqNVJp5bYMLVp4PL8Db/uhFlvNl+NkqsMO+L04yb:R+wHWqNB5bYMLVp4P4bclpH+
Malware Config
Signatures
Files
-
b70680c83e94d7ccd8aed4d62e4ddfd7c39e7f47cfbb5319d88037998194a693.exe windows x86
75125ca2d8260b3e132abb9a09b0062b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
log10
calloc
malloc
memmove
user32
EnableMenuItem
GetDlgItem
GetMenu
DrawIcon
GetClassInfoA
EnableWindow
CallNextHookEx
SetCursor
DrawEdge
RegisterClassA
IsWindowVisible
IsChild
GetLastActivePopup
GetMenuItemID
EqualRect
GetWindowTextA
DispatchMessageA
DefWindowProcA
GetDCEx
TrackPopupMenu
SetWindowTextA
CreateWindowExA
CharNextA
DefFrameProcA
GetActiveWindow
SetWindowPos
ShowWindow
GetDC
ShowScrollBar
GetSysColor
GetForegroundWindow
BeginDeferWindowPos
GetScrollRange
GetWindow
EnumChildWindows
BeginPaint
DrawMenuBar
CreateIcon
GetSysColorBrush
CreatePopupMenu
IsWindowEnabled
GetPropA
EnumThreadWindows
DispatchMessageW
EndPaint
SetWindowLongA
GetParent
GetMenuStringA
DeferWindowPos
DefMDIChildProcA
EnableScrollBar
GetSubMenu
GetClassLongA
CharLowerBuffA
GetClipboardData
CallWindowProcA
HideCaret
GetMenuItemInfoA
GetCursor
GetDesktopWindow
EnumWindows
EndDeferWindowPos
CreateMenu
kernel32
GetFileAttributesA
FreeLibrary
VirtualQuery
WideCharToMultiByte
lstrlenA
DeleteFileA
ExitProcess
WriteFile
SetEndOfFile
lstrcpyA
GetLocaleInfoA
GetUserDefaultLCID
lstrcmpA
SetEvent
lstrcmpiA
GetCurrentThread
GetModuleHandleA
Sleep
SetThreadLocale
CreateEventA
GetTickCount
GetDateFormatA
SizeofResource
LoadLibraryA
GetDiskFreeSpaceA
GlobalDeleteAtom
FreeResource
VirtualFree
GetProcessHeap
GlobalAlloc
GetCommandLineA
GetFullPathNameA
SetLastError
MoveFileA
lstrcatA
FindResourceA
MoveFileExA
VirtualAllocEx
FindClose
GetCurrentProcessId
LockResource
VirtualAlloc
GetEnvironmentStrings
GetLocalTime
FormatMessageA
GetStartupInfoA
GetSystemDefaultLangID
HeapFree
GetACP
HeapDestroy
GetLastError
DeleteCriticalSection
ReadFile
GetFileSize
GetThreadLocale
GetStringTypeA
GetVersionExA
LocalAlloc
CreateFileA
GetStringTypeW
GetFileType
SetHandleCount
SetErrorMode
LoadLibraryExA
GlobalFindAtomA
WaitForSingleObject
gdi32
CreateDIBSection
CreatePenIndirect
LineTo
GetCurrentPositionEx
Sections
CODE Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ