Static task
static1
Behavioral task
behavioral1
Sample
7fdcf8b2654026990b06a6e5e50fe30a9516312f5995763f550e56647d167875.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7fdcf8b2654026990b06a6e5e50fe30a9516312f5995763f550e56647d167875.exe
Resource
win10v2004-20220812-en
General
-
Target
7fdcf8b2654026990b06a6e5e50fe30a9516312f5995763f550e56647d167875
-
Size
523KB
-
MD5
021f19a9fda963ff8fcbac8e9a3d651a
-
SHA1
97fc68ef12ce0e7fe1c13311081ebdaeb9df3476
-
SHA256
7fdcf8b2654026990b06a6e5e50fe30a9516312f5995763f550e56647d167875
-
SHA512
f96ce2332fffaad7e49353a54aafd1a96b54dcd59b50d44f7722b4b397bf6fe1b6f8d7c50eb9d741095e7171599777cab65677741c178b16495d1950883bb1f5
-
SSDEEP
12288:prY982zefqGy9lk8AY/q8Z8XjKvJMRrmk:prY98Mefod/JZAk0rm
Malware Config
Signatures
Files
-
7fdcf8b2654026990b06a6e5e50fe30a9516312f5995763f550e56647d167875.exe windows x86
243ea6b55554f81554a606e481764e7b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharLowerW
PostMessageW
RegisterClassA
DefWindowProcA
GetSubMenu
LookupIconIdFromDirectory
CreateWindowExW
MessageBoxW
ShowWindow
DlgDirSelectExW
RegisterClassExA
DdeCmpStringHandles
DestroyWindow
ChildWindowFromPointEx
WinHelpW
comctl32
InitCommonControlsEx
ImageList_Add
ImageList_GetDragImage
ImageList_SetFlags
ImageList_GetIcon
wininet
FindFirstUrlCacheContainerW
InternetTimeFromSystemTimeA
GopherFindFirstFileA
InternetSetOptionExA
InternetUnlockRequestFile
CreateUrlCacheGroup
InternetLockRequestFile
FreeUrlCacheSpaceW
kernel32
SetStdHandle
GetTimeFormatA
CreateMutexA
GetLocaleInfoW
GetStringTypeW
SetUnhandledExceptionFilter
SetEnvironmentVariableA
IsValidLocale
ReadFile
SetConsoleCtrlHandler
GetStringTypeA
GetSystemTimeAsFileTime
LoadLibraryA
InitializeCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GetTickCount
SetFilePointer
GetProcessHeap
GetOEMCP
CompareStringW
GetLastError
GetModuleHandleA
HeapReAlloc
Sleep
GetTimeZoneInformation
GetCurrentProcessId
IsValidCodePage
GetEnvironmentStringsW
GetCurrentProcess
GetConsoleOutputCP
GetConsoleMode
HeapFree
ExitProcess
OpenEventA
IsDebuggerPresent
EnterCriticalSection
WriteConsoleW
CreateFileA
EnumSystemLocalesA
SetHandleCount
GetFileType
FreeEnvironmentStringsA
WideCharToMultiByte
FreeLibrary
QueryPerformanceCounter
DeleteCriticalSection
TerminateProcess
GetCurrentThread
SetLastError
WriteConsoleA
TlsGetValue
CompareStringA
RtlUnwind
GetProcAddress
FreeEnvironmentStringsW
OpenMutexA
GetStartupInfoA
TlsSetValue
GetUserDefaultLCID
TlsFree
GetLocaleInfoA
ReadConsoleA
GetTempFileNameA
GetStringTypeExW
InterlockedDecrement
GetModuleFileNameA
UnhandledExceptionFilter
InterlockedIncrement
TlsAlloc
GetACP
GetStdHandle
CloseHandle
HeapDestroy
VirtualQuery
VirtualFree
GetConsoleTitleW
GetEnvironmentStrings
SetPriorityClass
GetCPInfo
HeapCreate
VirtualAlloc
GetDateFormatA
GetVersionExA
FlushFileBuffers
WriteFile
InterlockedExchange
GetConsoleCP
HeapAlloc
HeapSize
MultiByteToWideChar
GetCommandLineA
LCMapStringA
LCMapStringW
Sections
.text Size: 332KB - Virtual size: 332KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 62KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 105KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ