Static task
static1
Behavioral task
behavioral1
Sample
b52693b17b46b3f17b305dc4190522f29ea08dc37edaf4886787ddaeacd8a078.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b52693b17b46b3f17b305dc4190522f29ea08dc37edaf4886787ddaeacd8a078.exe
Resource
win10v2004-20230220-en
General
-
Target
b52693b17b46b3f17b305dc4190522f29ea08dc37edaf4886787ddaeacd8a078
-
Size
1.7MB
-
MD5
fcb468503f2e5fc18aaa9073a2ad37c9
-
SHA1
d97a91797d54fdee152c6609893c5de6013339c5
-
SHA256
b52693b17b46b3f17b305dc4190522f29ea08dc37edaf4886787ddaeacd8a078
-
SHA512
6fac0657cb902fd70d5595e573288fd9cc788395513caccd150370f3b5e4d400bce87cd2725ff2ea554001e09a85200d97d4ff42aa70e60849e58fbb91271ebf
-
SSDEEP
24576:PqbWKEBDlCto8TwyQzJ6TpWncwZ0yGrMBuH/rjO8UxFuG6SJwTHZEaCCbVTawaCD:SCKE0EJ6TkcxAAPzLGvE5EwP
Malware Config
Signatures
Files
-
b52693b17b46b3f17b305dc4190522f29ea08dc37edaf4886787ddaeacd8a078.exe windows x86
dc896fd4b54fe940f67cf678f35bf805
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
lstrlenW
GetLastError
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
SetLastError
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
CreateEventW
CreateDirectoryW
FindClose
FindNextFileW
FindFirstFileW
GetWindowsDirectoryA
WriteFile
ReadFile
ConnectNamedPipe
CreateNamedPipeW
WritePrivateProfileStringW
CopyFileW
CreateFileW
SetFileAttributesW
CreateThread
InterlockedCompareExchange
HeapFree
GetProcessHeap
HeapAlloc
LoadLibraryA
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
FlushInstructionCache
GetFullPathNameA
VirtualQuery
LoadLibraryW
lstrlenA
DebugBreak
IsBadReadPtr
HeapValidate
GetFullPathNameW
SetCurrentDirectoryA
GetCurrentDirectoryA
PeekNamedPipe
GetFileInformationByHandle
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SetCurrentDirectoryW
SetEnvironmentVariableW
GetVersionExW
FormatMessageW
LocalFree
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
GetTempFileNameW
MoveFileW
GetCurrentDirectoryW
SetVolumeLabelW
GetModuleHandleW
GetProcAddress
GetCurrentProcess
GetDiskFreeSpaceExW
OutputDebugStringA
Sleep
DeleteFileW
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
CloseHandle
GetDriveTypeW
GetDiskFreeSpaceW
GetFileSize
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
GetTimeZoneInformation
CreateFileA
WriteConsoleW
DeleteCriticalSection
InitializeCriticalSection
GetTickCount
LeaveCriticalSection
EnterCriticalSection
RaiseException
WideCharToMultiByte
GetPrivateProfileIntW
GetPrivateProfileStringW
GetModuleFileNameW
OutputDebugStringW
GetTempPathW
GetDriveTypeA
InterlockedExchange
GetStartupInfoW
RtlUnwind
GetFileAttributesW
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RemoveDirectoryW
MoveFileA
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
FindNextFileA
LCMapStringA
LCMapStringW
GetCPInfo
GetStringTypeW
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThread
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
FatalAppExitA
SetConsoleCtrlHandler
InitializeCriticalSectionAndSpinCount
GetACP
GetOEMCP
IsValidCodePage
SetFilePointer
HeapReAlloc
HeapSize
GetModuleHandleA
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
GetStringTypeA
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
SetStdHandle
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
user32
OemToCharBuffA
wsprintfW
SetWindowLongW
SendMessageW
ShowWindow
SetDlgItemTextW
MessageBoxW
UnregisterClassA
GetClassLongW
SetClassLongW
DefWindowProcW
GetActiveWindow
DialogBoxParamW
LoadBitmapW
GetParent
GetWindow
GetWindowRect
MonitorFromWindow
GetMonitorInfoW
GetClientRect
MapWindowPoints
SetWindowPos
EndPaint
BeginPaint
GetWindowLongW
DestroyWindow
CharNextW
EndDialog
CharToOemBuffA
advapi32
GetTokenInformation
OpenProcessToken
RegDeleteKeyW
RegDeleteValueW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
ole32
CoCreateInstance
CoTaskMemFree
CoUninitialize
CoInitialize
CoTaskMemRealloc
CoTaskMemAlloc
oleaut32
VarUI4FromStr
SysFreeString
comctl32
InitCommonControlsEx
gdi32
SetBkColor
SetTextColor
SetBkMode
DeleteObject
DeleteDC
BitBlt
SelectObject
GetObjectW
CreateCompatibleDC
CreateSolidBrush
Sections
.text Size: 467KB - Virtual size: 467KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 194KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ