Static task
static1
Behavioral task
behavioral1
Sample
77e7dfcb134df1bb90c2d89e227bb8c32c61b91a95da618611fff53969a74cb0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
77e7dfcb134df1bb90c2d89e227bb8c32c61b91a95da618611fff53969a74cb0.exe
Resource
win10v2004-20220901-en
General
-
Target
77e7dfcb134df1bb90c2d89e227bb8c32c61b91a95da618611fff53969a74cb0
-
Size
270KB
-
MD5
6177d56dbdda7a400f253efc99c5edb9
-
SHA1
7e505a93697896d30ed98f402b10e35d119bacfe
-
SHA256
77e7dfcb134df1bb90c2d89e227bb8c32c61b91a95da618611fff53969a74cb0
-
SHA512
d72203d769bcb5e77e2f0e2407c3bae999d8412b8e7c3aef6fe4fa3a5bbdbac57ec0ec18339d171d59e4ad0c462e38120dad77c747fc31d693fcfcf286b61bb1
-
SSDEEP
6144:8cbOqzZIgYpQ2euRLL6lxW317W3zYWKSv2fX1/bKK91ioN:8c1t2hRX4UW3zZK02fF/bqo
Malware Config
Signatures
Files
-
77e7dfcb134df1bb90c2d89e227bb8c32c61b91a95da618611fff53969a74cb0.exe windows x86
8f9532d1c6e9f89290211ff26d8329ac
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThread
DeleteCriticalSection
LCMapStringA
LocalFileTimeToFileTime
RtlUnwind
GetTimeFormatA
RtlFillMemory
GetCurrentProcess
GetStartupInfoA
VirtualAlloc
SetConsoleCtrlHandler
IsValidCodePage
HeapReAlloc
GetLocaleInfoW
EnumTimeFormatsA
GetLocaleInfoA
GetACP
MultiByteToWideChar
GetModuleFileNameA
GetCommandLineW
GetStringTypeW
ExitProcess
GetEnvironmentStringsW
GetStringTypeA
HeapCreate
LoadLibraryA
GetTickCount
GetSystemTimeAsFileTime
GetStartupInfoW
FreeLibrary
InitializeCriticalSectionAndSpinCount
QueryPerformanceCounter
UnhandledExceptionFilter
SetUnhandledExceptionFilter
lstrcpy
SetLastError
TlsGetValue
FreeEnvironmentStringsW
HeapAlloc
GetModuleHandleW
HeapFree
WritePrivateProfileSectionW
SetEnvironmentVariableA
GetCurrentProcessId
GlobalFindAtomA
GetTimeZoneInformation
GetStdHandle
TlsAlloc
HeapSize
EnumSystemLocalesA
GetFileType
GetUserDefaultLCID
GetCPInfo
WriteFile
Sleep
LoadLibraryW
CompareStringA
GetModuleHandleA
GetFileSize
WideCharToMultiByte
GetProcAddress
VirtualQueryEx
SetHandleCount
LCMapStringW
SetPriorityClass
EnterCriticalSection
HeapDestroy
GetProcAddress
GetLastError
GetModuleFileNameW
CompareStringW
IsValidLocale
InterlockedExchange
InterlockedDecrement
VirtualFree
GetOEMCP
VirtualQuery
TlsSetValue
TlsFree
GetProfileIntW
LeaveCriticalSection
GetCurrentThreadId
InterlockedIncrement
SetConsoleTitleA
TerminateProcess
GetDateFormatA
IsDebuggerPresent
wininet
FindNextUrlCacheEntryExA
FindFirstUrlCacheEntryExW
GetUrlCacheEntryInfoExA
DeleteUrlCacheEntryW
InternetWriteFileExW
InternetSetDialState
InternetAlgIdToStringA
InternetDialA
InternetSecurityProtocolToStringA
HttpOpenRequestW
shell32
DragQueryFileA
SHUpdateRecycleBinIcon
SHAppBarMessage
SHGetNewLinkInfo
SHGetFileInfo
SHGetPathFromIDListA
SHQueryRecycleBinA
SHEmptyRecycleBinW
RealShellExecuteA
ShellExecuteExW
ShellAboutW
SHGetDiskFreeSpaceA
SHGetPathFromIDListW
DragQueryFile
DuplicateIcon
SHFileOperationW
SHBrowseForFolderA
DragAcceptFiles
ShellExecuteW
ExtractIconExA
SheGetDirA
SHGetSpecialFolderLocation
SHFormatDrive
ShellExecuteA
ExtractAssociatedIconA
Sections
.text Size: 126KB - Virtual size: 125KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 140KB - Virtual size: 153KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ