Static task
static1
Behavioral task
behavioral1
Sample
b84bfe4255176d78f313fbb71fd105b498c5e33e100f5badef6770705847adb3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b84bfe4255176d78f313fbb71fd105b498c5e33e100f5badef6770705847adb3.exe
Resource
win10v2004-20220812-en
General
-
Target
b84bfe4255176d78f313fbb71fd105b498c5e33e100f5badef6770705847adb3
-
Size
18.8MB
-
MD5
c6a00928bf4480b6cf6f7fefd2d7fe81
-
SHA1
7ea8e737e18c19c0667b237027fad85cf7f8a132
-
SHA256
b84bfe4255176d78f313fbb71fd105b498c5e33e100f5badef6770705847adb3
-
SHA512
ed30cb3852a94768474ec6f88ffa9c51defaac0674d777f1ebffc08f0e77a02aa7335858e9f73dca0673430ab73487ca01253cc625240d1aa91b9b2236e9b6fe
-
SSDEEP
393216:PZnHkwYP7glmjhP1mQj5d/tc1twBq5Z/nMAGkEOSJaZcIJ5AT:hnH68AICtSeEZ/nMAvScJQ
Malware Config
Signatures
Files
-
b84bfe4255176d78f313fbb71fd105b498c5e33e100f5badef6770705847adb3.exe windows x86
eec4c9510d1f15621b464022e8c2d408
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
shell32
SHBrowseForFolderW
SHGetFileInfoW
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteExW
ShellExecuteW
CommandLineToArgvW
kernel32
HeapAlloc
LocalFree
GetProcessHeap
GetFileAttributesW
LoadLibraryW
CloseHandle
GetProcAddress
FreeLibrary
GetCurrentProcess
GetVersionExW
GetModuleHandleW
ExpandEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
WaitForSingleObject
CreateProcessW
GetModuleFileNameW
GetCurrentDirectoryW
SetCurrentDirectoryW
SetFileApisToOEM
SetPriorityClass
SetThreadPriority
GetEnvironmentVariableW
GetCurrentThread
GetCommandLineW
FindResourceW
FindFirstFileW
FindNextFileW
FindClose
GetLongPathNameW
CreateFileW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetCurrentThreadId
LoadLibraryExW
WriteFile
SetFileTime
SetEndOfFile
FormatMessageW
InterlockedExchangeAdd
ReadFile
SetFilePointer
GetFileSize
ResumeThread
GetACP
GetLastError
WideCharToMultiByte
CreateDirectoryW
GetFullPathNameW
lstrlenW
RemoveDirectoryW
GetTempPathW
SetFileAttributesW
DeleteFileW
GetWindowsDirectoryW
MoveFileExW
GetTempFileNameW
MoveFileW
CreateEventW
SetEvent
ResetEvent
WaitForMultipleObjects
GetCurrentProcessId
FileTimeToSystemTime
WriteConsoleW
DecodePointer
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapReAlloc
HeapSize
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExW
LCMapStringW
HeapFree
MultiByteToWideChar
VirtualFree
VirtualAlloc
GetStringTypeW
ExitProcess
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
WaitForSingleObjectEx
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
GetStdHandle
GetFileType
RtlUnwind
RaiseException
SetLastError
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
user32
DispatchMessageW
SetTimer
IsDialogMessageW
TranslateMessage
LoadIconW
KillTimer
PostQuitMessage
EnableWindow
ScreenToClient
IsWindow
MessageBoxW
ShowWindow
PostMessageW
GetWindowRect
SetWindowPos
DialogBoxParamW
SendMessageW
EndDialog
SetWindowTextW
SetFocus
GetDlgItem
GetWindowTextW
IsWindowVisible
CreateDialogParamW
GetMessageW
GetDesktopWindow
LoadStringW
DestroyIcon
GetSystemMetrics
gdi32
CreateSolidBrush
DeleteObject
ole32
CoCreateInstance
CoInitializeEx
CoUninitialize
CoInitialize
Sections
.text Size: 314KB - Virtual size: 314KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ