Static task
static1
Behavioral task
behavioral1
Sample
bb2855c5c688f7ca207424cf9d6da726fc78a455646882d9b390eb9d87c1fe7a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bb2855c5c688f7ca207424cf9d6da726fc78a455646882d9b390eb9d87c1fe7a.exe
Resource
win10v2004-20220901-en
General
-
Target
bb2855c5c688f7ca207424cf9d6da726fc78a455646882d9b390eb9d87c1fe7a
-
Size
92KB
-
MD5
357cf8b63885287dcc9188ddfa8f8e69
-
SHA1
e13cc693656e868a689730da4b4bb2ddfd20175c
-
SHA256
bb2855c5c688f7ca207424cf9d6da726fc78a455646882d9b390eb9d87c1fe7a
-
SHA512
8ab5f0f6e93c616f1802443c22df9c472a274b116048d3731c0c5c8fe0ad1abfc950ca0d969cbc86f96bcc5abf0eabc3cefb3d6f11c257f31c6a947fc0b34bf5
-
SSDEEP
1536:UPpXz757/Jgx/eAEGhJb37ZhvKsEs9GzvJionPNzjpcM3ntUKfWhL4Yp:4DJI2gD/ZpKsEJzvJionVzCM3tUf2
Malware Config
Signatures
Files
-
bb2855c5c688f7ca207424cf9d6da726fc78a455646882d9b390eb9d87c1fe7a.exe windows x86
0e83e1020d209cbbf3948a7bde54dcca
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memmove
memcpy
calloc
strcmp
tan
shlwapi
PathFileExistsA
SHQueryInfoKeyA
PathIsContentTypeA
SHQueryValueExA
PathIsDirectoryA
SHEnumValueA
kernel32
HeapFree
LoadResource
GetSystemDefaultLangID
WaitForSingleObject
EnumCalendarInfoA
WideCharToMultiByte
GetTickCount
VirtualQuery
Sleep
GlobalAddAtomA
GlobalAlloc
GetThreadLocale
lstrcmpA
ExitThread
FreeLibrary
GetLocalTime
GetLastError
LockResource
DeleteCriticalSection
VirtualAlloc
CreateThread
GetDateFormatA
GetEnvironmentStrings
GetStartupInfoA
DeleteFileA
GetModuleFileNameA
GetStringTypeA
GetFileSize
GetVersionExA
GetUserDefaultLCID
GetCurrentProcess
HeapAlloc
InitializeCriticalSection
GetFileAttributesA
FormatMessageA
lstrlenA
GetDiskFreeSpaceA
LoadLibraryExA
LocalFree
SetThreadLocale
GetStdHandle
GetModuleHandleA
GetOEMCP
ExitProcess
GetFileType
SetEndOfFile
lstrcatA
SetErrorMode
GetVersion
lstrcpynA
GetProcAddress
GetCommandLineA
GetCurrentProcessId
CompareStringA
lstrcmpiA
LoadLibraryA
GetLocaleInfoA
LocalReAlloc
SetHandleCount
LocalAlloc
VirtualAllocEx
GetCurrentThread
EnterCriticalSection
WriteFile
SetEvent
VirtualFree
shell32
DragQueryFileA
SHGetSpecialFolderLocation
SHGetDiskFreeSpaceA
user32
GetCursor
CallWindowProcA
GetActiveWindow
GetDC
TrackPopupMenu
DrawTextA
ShowWindow
EnableMenuItem
EndPaint
DeferWindowPos
GetClassLongA
GetPropA
GetIconInfo
SetWindowLongA
GetSysColor
GetMenuItemInfoA
GetSysColorBrush
IsChild
GetKeyState
FrameRect
DefWindowProcA
IsMenu
CallNextHookEx
GetMenuItemID
GetScrollInfo
GetCursorPos
CreateIcon
FindWindowA
ClientToScreen
FillRect
GetClientRect
IsWindowVisible
GetMessagePos
GetMenu
MessageBoxA
GetScrollPos
BeginPaint
GetFocus
comdlg32
GetSaveFileNameA
FindTextA
GetOpenFileNameA
GetFileTitleA
ChooseColorA
gdi32
BitBlt
GetCurrentPositionEx
CreateDIBSection
GetDIBits
GetObjectA
GetBitmapBits
CopyEnhMetaFileA
CreateBitmap
SelectObject
CreateDIBitmap
Sections
.text Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 512B - Virtual size: 265B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 226B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 995B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE