Static task
static1
Behavioral task
behavioral1
Sample
b274295adf11a96e6681113e48a845ddaa7e0fe163da25467e43a70a26a23386.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b274295adf11a96e6681113e48a845ddaa7e0fe163da25467e43a70a26a23386.exe
Resource
win10v2004-20220812-en
General
-
Target
b274295adf11a96e6681113e48a845ddaa7e0fe163da25467e43a70a26a23386
-
Size
76KB
-
MD5
e05bc7be8ba7709ff1caaf918ffc4441
-
SHA1
fbbcb03cdf40a8641b09e181583beba32ded1a1c
-
SHA256
b274295adf11a96e6681113e48a845ddaa7e0fe163da25467e43a70a26a23386
-
SHA512
157af64b7bdce48fe51b4732c6024a063c6cd9e12a03abd83a1474b9a3746bf0ba8ced7d5893aa8c4839999a4ab280f5d10530e29c4fe0f714ac9e5531a45a9d
-
SSDEEP
1536:ZgElOxJ0TZLBWmnl6jXjOM7oHUcu29ZZe:CElOsl90jXjOM7o0cu2XZ
Malware Config
Signatures
Files
-
b274295adf11a96e6681113e48a845ddaa7e0fe163da25467e43a70a26a23386.exe windows x86
a1920ad1b14d1723c6ec510dc0482abe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
LoadLibraryA
GetVersionExA
WritePrivateProfileStringA
OpenProcess
GlobalUnlock
GlobalLock
GlobalAlloc
MulDiv
lstrcpyA
MultiByteToWideChar
lstrlenA
InterlockedDecrement
InterlockedIncrement
CompareStringW
CompareStringA
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
GetCPInfo
GetModuleHandleA
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
SetUnhandledExceptionFilter
HeapSize
HeapReAlloc
WriteFile
VirtualFree
ReadProcessMemory
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
LCMapStringW
LCMapStringA
HeapAlloc
GetProcAddress
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
VirtualAlloc
WaitForSingleObject
HeapFree
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
SetEnvironmentVariableA
GetCurrentThreadId
RaiseException
GetVersion
GetCommandLineA
GetStartupInfoA
GetCurrentProcess
TerminateProcess
ExitProcess
GetLocalTime
GetSystemTime
VirtualFreeEx
GetExitCodeThread
HeapCreate
CloseHandle
GetLastError
WideCharToMultiByte
LocalFree
RtlUnwind
GetTimeZoneInformation
user32
RegisterWindowMessageA
SendMessageTimeoutA
MessageBoxA
EmptyClipboard
SetWindowLongA
ReleaseCapture
GetSystemMenu
AppendMenuA
DeleteMenu
LoadIconA
SendMessageA
LoadCursorA
GetDlgItem
CheckDlgButton
GetSystemMetrics
GetWindowRect
SetWindowPos
DialogBoxParamA
EndDialog
IsDlgButtonChecked
GetWindowTextA
OpenClipboard
GetDC
SetClipboardData
CloseClipboard
GetSysColor
ChildWindowFromPoint
SetCapture
SetCursor
GetCursorPos
WindowFromPoint
GetWindowThreadProcessId
GetClassNameA
ScreenToClient
GetParent
ChildWindowFromPointEx
GetWindow
PtInRect
GetWindowLongA
SetWindowTextA
FindWindowA
BringWindowToTop
ShowWindow
gdi32
CreateFontIndirectA
CreateSolidBrush
SetTextColor
SetBkColor
GetDeviceCaps
shell32
ShellExecuteA
ole32
CoInitialize
CoUninitialize
OleRun
CoCreateInstance
oleaut32
GetErrorInfo
SysAllocStringByteLen
SysAllocString
VariantInit
VariantClear
SysStringLen
SysFreeString
advapi32
RegSetValueExA
RegCloseKey
RegCreateKeyExA
Sections
.text Size: 40KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ