Static task
static1
Behavioral task
behavioral1
Sample
77e8f5e5ded1bb9f9d5ad332e162f95f7abec25c1bc16454e17634db2a2fad84.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
77e8f5e5ded1bb9f9d5ad332e162f95f7abec25c1bc16454e17634db2a2fad84.exe
Resource
win10v2004-20220812-en
General
-
Target
77e8f5e5ded1bb9f9d5ad332e162f95f7abec25c1bc16454e17634db2a2fad84
-
Size
526KB
-
MD5
d9f0eb5158afa8a93fcdbd3e7f597c64
-
SHA1
878c0571c5cbb81bb6ac4d0b3b5b4f312666876c
-
SHA256
77e8f5e5ded1bb9f9d5ad332e162f95f7abec25c1bc16454e17634db2a2fad84
-
SHA512
f294d94f4d642431a99210a0b5e2ad3f6ed09495f5a570a78631632c479a2e5dde502cf5e1527c7143536c8ff956d5138da150dc2318d03483c9cc6103b3efd4
-
SSDEEP
12288:b9qECi5Y8g2KpkWU3RHzFGqQnbJ8Ks3z:b9qF2YZ+5lybJPs3z
Malware Config
Signatures
Files
-
77e8f5e5ded1bb9f9d5ad332e162f95f7abec25c1bc16454e17634db2a2fad84.exe windows x86
6db73cda1fb5bbef2ae95e6a0b28a9f1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
CryptDestroyHash
CryptEncrypt
RegEnumKeyA
CryptAcquireContextW
CryptImportKey
CryptEnumProvidersA
RegFlushKey
CryptHashSessionKey
comdlg32
ChooseFontA
PageSetupDlgA
PrintDlgA
shell32
ShellExecuteExW
kernel32
GetModuleHandleA
VirtualFree
GetTickCount
TlsAlloc
VirtualAlloc
GetPrivateProfileSectionA
GetSystemTime
VirtualProtectEx
GetFileType
OpenMutexA
GetStringTypeW
InterlockedDecrement
GetCurrentThread
CommConfigDialogA
GetCommandLineW
UnhandledExceptionFilter
GetCurrentProcessId
GetEnvironmentStringsW
SetStdHandle
CloseHandle
FreeEnvironmentStringsW
LCMapStringA
GetLocalTime
GetEnvironmentStrings
MultiByteToWideChar
TlsSetValue
GetStartupInfoA
DeleteCriticalSection
EnumCalendarInfoW
GetLastError
HeapFree
WriteFile
FreeEnvironmentStringsA
GetCurrentThreadId
GetTimeZoneInformation
GetModuleFileNameA
GetSystemTimeAsFileTime
SetFilePointer
TlsFree
GetConsoleTitleW
GetCommandLineA
QueryPerformanceCounter
InterlockedExchange
ReadConsoleOutputAttribute
GetStartupInfoW
ExitProcess
CompareStringW
HeapDestroy
RtlUnwind
GetModuleFileNameW
GetVersion
SetEnvironmentVariableA
FileTimeToSystemTime
GetStringTypeA
IsBadWritePtr
GetCurrentProcess
LoadLibraryA
EnterCriticalSection
WideCharToMultiByte
ReadFile
FlushFileBuffers
InterlockedIncrement
GetCPInfo
GlobalFindAtomW
LeaveCriticalSection
HeapCreate
CompareStringA
HeapAlloc
SetLastError
HeapReAlloc
GetStdHandle
CreateMutexA
SetHandleCount
GetDriveTypeW
InitializeCriticalSection
TerminateProcess
TlsGetValue
LCMapStringW
VirtualQuery
GetProcAddress
wininet
InternetConfirmZoneCrossing
InternetOpenW
user32
SetMenuItemBitmaps
FindWindowA
MapVirtualKeyA
CopyImage
LoadImageW
LoadIconA
GetDesktopWindow
CreateCaret
RegisterClassExA
MonitorFromWindow
CharPrevA
GetScrollInfo
UnpackDDElParam
SetDoubleClickTime
RegisterClassExW
InSendMessageEx
LoadAcceleratorsW
ChildWindowFromPoint
SendMessageA
RegisterClassA
comctl32
InitCommonControlsEx
Sections
.text Size: 151KB - Virtual size: 150KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 357KB - Virtual size: 356KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ