Static task
static1
Behavioral task
behavioral1
Sample
Breeze-VIPChair.exe
Resource
win10-20230220-en
General
-
Target
Breeze-VIPChair.exe
-
Size
7.0MB
-
MD5
0ac4b644d9e85c8810ca661b88a85dda
-
SHA1
f3e0d715c27aee27e579831f98fd8a7c560cf5a6
-
SHA256
bed307a518ae5a49429fb221c7e7e59cefbd59391ea5bccc69255adf22068557
-
SHA512
61d4bc5c3adbe2e96dd7530e835c0ab0440952cb3b35a0ee948af3816830a320194014989e07b1a3d520a8e32de564658db502d8fac25d2129f3069df48f7296
-
SSDEEP
98304:A3JPaL1voDJbdTWFy98U9+SSwKHw1WObbbv5yR0RQeCdf7UFthUD5lGBx+H9h/3t:uSVoDdZAD95whbhyQ27UF7Uj/gyGm1
Malware Config
Signatures
Files
-
Breeze-VIPChair.exe.exe windows x64
4b856a2ef984b1ac6a5b1c4a2768078a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
ws2_32
WSAStartup
kernel32
Process32NextW
GetVersion
LocalAlloc
LocalFree
GetModuleFileNameW
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
GetAsyncKeyState
CharUpperBuffW
advapi32
CryptDestroyHash
msvcp140
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z
wininet
InternetOpenUrlA
urlmon
URLDownloadToFileA
normaliz
IdnToAscii
wldap32
ord27
crypt32
CertFreeCertificateContext
shlwapi
PathFileExistsA
psapi
GetModuleInformation
userenv
UnloadUserProfile
vcruntime140
__std_exception_destroy
vcruntime140_1
__CxxFrameHandler4
api-ms-win-crt-runtime-l1-1-0
_c_exit
api-ms-win-crt-string-l1-1-0
strncpy
api-ms-win-crt-heap-l1-1-0
_set_new_mode
api-ms-win-crt-stdio-l1-1-0
fclose
api-ms-win-crt-filesystem-l1-1-0
_fstat64
api-ms-win-crt-convert-l1-1-0
strtod
api-ms-win-crt-time-l1-1-0
_gmtime64
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-utility-l1-1-0
qsort
api-ms-win-crt-math-l1-1-0
_dclass
ntdll
VerSetConditionMask
Sections
.text Size: - Virtual size: 423KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.^*b Size: - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.Got Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Z@~ Size: 7.0MB - Virtual size: 7.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 236B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 476B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ