Static task
static1
Behavioral task
behavioral1
Sample
c7dc529d8aae76b4e797e4e9e3ea7cd69669e6c3bb3f94d80f1974d1b9f69378.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
c7dc529d8aae76b4e797e4e9e3ea7cd69669e6c3bb3f94d80f1974d1b9f69378.exe
Resource
win10v2004-20220414-en
General
-
Target
c7dc529d8aae76b4e797e4e9e3ea7cd69669e6c3bb3f94d80f1974d1b9f69378
-
Size
827KB
-
MD5
7f9c454a2e016e533e181d53eba113bc
-
SHA1
694dc7713537a7237030f7623881423fcb8d8c5c
-
SHA256
c7dc529d8aae76b4e797e4e9e3ea7cd69669e6c3bb3f94d80f1974d1b9f69378
-
SHA512
6869cf5a7c3526acf402b1ef09a9477dedf6cf534ff728e0823b9413ba41e888bd5b61cc20421d4a799df493126598a4a906ac2ab46147d9e4bcfa5d3600a110
-
SSDEEP
12288:06NINoPgXqvRyq5E3R18y0kQzX3EL1TdB0JUsoSfsJuRqQy5d5t:06iWP9JAR18ycD3ErB2rs8MQy5
Malware Config
Signatures
Files
-
c7dc529d8aae76b4e797e4e9e3ea7cd69669e6c3bb3f94d80f1974d1b9f69378.exe windows x86
f4228cb049acde33150c5fe763f4201f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
HeapAlloc
HeapReAlloc
HeapFree
VirtualAlloc
GetCommandLineA
GetProcessHeap
RaiseException
RtlUnwind
HeapSize
ExitProcess
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetFilePointer
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
GetACP
IsValidCodePage
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
WriteFile
GetOEMCP
GetCPInfo
GetLocaleInfoA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetVersionExA
GetThreadLocale
GlobalGetAtomNameA
GlobalFlags
lstrcmpA
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
GetModuleHandleA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
GetCurrentProcessId
GetModuleFileNameA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
SetLastError
InterlockedExchange
LoadLibraryA
SizeofResource
FreeLibrary
FlushFileBuffers
PrepareTape
Sleep
GetCurrentProcess
GetVersion
CompareStringA
LockResource
SetEvent
GetProcAddress
CloseHandle
VirtualProtect
lstrlenA
DeleteFileA
WideCharToMultiByte
MultiByteToWideChar
GetLastError
FindResourceA
LocalFree
LocalAlloc
CreateProcessA
FindResourceExA
GetStartupInfoA
LoadResource
IsDebuggerPresent
GetTickCount
user32
SetForegroundWindow
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetClassNameA
PtInRect
GetWindowTextA
SetWindowTextA
UnregisterClassA
SetWindowsHookExA
GetKeyState
LoadCursorA
GetSystemMetrics
GetDC
GetSysColor
UnhookWindowsHookEx
GetWindowThreadProcessId
SendMessageA
GetParent
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
DrawTextA
InflateRect
GetWindowRect
CreatePopupMenu
GetForegroundWindow
CallNextHookEx
DispatchMessageA
EnumWindows
CreateDialogIndirectParamA
SetParent
GetSysColorBrush
GetClientRect
IntersectRect
DefWindowProcA
GetWindowLongA
ExitWindowsEx
DialogBoxIndirectParamA
EndDeferWindowPos
GetClassInfoExA
ReleaseDC
MapWindowPoints
ValidateRect
PostQuitMessage
GrayStringA
DrawTextExA
TabbedTextOutA
DestroyMenu
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
PeekMessageA
GetMessagePos
gdi32
ExtTextOutA
SaveDC
RestoreDC
SetMapMode
ScaleViewportExtEx
PtVisible
SelectObject
SetViewportOrgEx
SetWindowExtEx
DeleteDC
GetStockObject
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
DeleteObject
GetDeviceCaps
SetViewportExtEx
ScaleWindowExtEx
OffsetViewportOrgEx
Escape
TextOutA
RectVisible
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
ole32
CoInitialize
CoRevokeClassObject
CoTaskMemAlloc
CoUninitialize
CoTaskMemFree
oleaut32
VariantClear
OleLoadPicture
OleCreatePictureIndirect
OleCreateFontIndirect
SysReAllocStringLen
SysFreeString
SysStringLen
OleCreatePropertyFrame
OleTranslateColor
SysAllocStringLen
SysReAllocString
OleIconToCursor
OleCreatePropertyFrameIndirect
SysAllocString
VariantChangeType
VariantInit
oleacc
LresultFromObject
CreateStdAccessibleObject
Sections
.text Size: 306KB - Virtual size: 305KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 227KB - Virtual size: 227KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 89KB - Virtual size: 407KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 203KB - Virtual size: 202KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ