Static task
static1
Behavioral task
behavioral1
Sample
b54e059f6a89bc358f83a8a770dcc8ee5ddec56dd2f731faf6f1ee4c4d4fadc9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b54e059f6a89bc358f83a8a770dcc8ee5ddec56dd2f731faf6f1ee4c4d4fadc9.exe
Resource
win10v2004-20221111-en
General
-
Target
b54e059f6a89bc358f83a8a770dcc8ee5ddec56dd2f731faf6f1ee4c4d4fadc9
-
Size
132KB
-
MD5
7ab8b911ade6f2cd0dfd9d206d9ad427
-
SHA1
e35087d8b866d05fc07ba7af09d6aebaceaa6e0d
-
SHA256
b54e059f6a89bc358f83a8a770dcc8ee5ddec56dd2f731faf6f1ee4c4d4fadc9
-
SHA512
44ce0ee8f8671e8bcdfa8c246f0c19a01dcde90393556f6b0807404e3376d51c32914a1f4b09f75f8bde6c90787ee7608e02c40d7a438a8dab61190290191178
-
SSDEEP
3072:aGqLQblhZ+RFltoc6PoK8xkJ0VYCsFBTWP9Kk5ck:afLQbERDtuTiVCWIk
Malware Config
Signatures
Files
-
b54e059f6a89bc358f83a8a770dcc8ee5ddec56dd2f731faf6f1ee4c4d4fadc9.exe windows x86
37817f6eea80ab33480f9b2fe404de53
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpW
GetFileSize
CreateFileW
LeaveCriticalSection
OutputDebugStringW
EnterCriticalSection
FlushFileBuffers
DeleteCriticalSection
SetFilePointer
TerminateProcess
WaitForSingleObject
CreateProcessW
GetExitCodeProcess
SuspendThread
ResumeThread
lstrlenA
WriteFile
WideCharToMultiByte
GetCurrentProcess
FreeLibrary
HeapReAlloc
GetProcAddress
LoadLibraryW
LocalFree
LocalAlloc
ReadProcessMemory
OpenProcess
GetComputerNameW
FindFirstFileW
GetStringTypeW
GetStringTypeA
LoadLibraryA
GetOEMCP
GetACP
SetStdHandle
GetCPInfo
GetDriveTypeA
IsBadCodePtr
IsBadReadPtr
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
HeapFree
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetFileAttributesW
lstrcatW
DeleteFileW
MoveFileExW
lstrlenW
GetWindowsDirectoryW
lstrcmpiW
GetSystemDirectoryW
RemoveDirectoryW
lstrcpyW
FindNextFileW
InitializeCriticalSection
GetLastError
SetLastError
FindClose
GetModuleFileNameW
lstrcpynW
GetVersionExA
CreateThread
HeapAlloc
FindResourceW
LoadResource
LockResource
GetExitCodeThread
Sleep
GetVersion
GetCommandLineA
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
GetFileType
CloseHandle
GetProcessHeap
RtlUnwind
GetFullPathNameW
InterlockedDecrement
InterlockedIncrement
RaiseException
GetLocalTime
GetModuleHandleA
GetStartupInfoA
TlsGetValue
ExitProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetUnhandledExceptionFilter
SetHandleCount
GetCurrentDirectoryW
MultiByteToWideChar
LCMapStringA
LCMapStringW
user32
MessageBoxA
SetWindowTextW
LoadStringW
ExitWindowsEx
EndDialog
DialogBoxParamW
WaitForInputIdle
MsgWaitForMultipleObjects
PeekMessageW
wsprintfW
SetForegroundWindow
GetWindowRect
GetSystemMetrics
SetWindowPos
DestroyWindow
GetMessageW
TranslateMessage
DispatchMessageW
PostQuitMessage
SystemParametersInfoW
GetDlgItem
DefWindowProcW
SendMessageW
ShowWindow
UpdateWindow
LoadIconW
LoadCursorW
RegisterClassExW
CreateDialogParamW
LoadStringA
MessageBoxW
gdi32
CreateFontIndirectW
DeleteObject
advapi32
CloseServiceHandle
RegOpenKeyExW
EnumDependentServicesW
StartServiceW
OpenServiceW
ControlService
DeleteService
QueryServiceStatus
OpenSCManagerW
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegQueryValueExW
RegEnumKeyExW
RegDeleteKeyW
shell32
SHChangeNotify
ole32
CoInitialize
CoUninitialize
comctl32
InitCommonControlsEx
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ