Static task
static1
Behavioral task
behavioral1
Sample
7de8ae4f68b5ea9cb44c08f0cb2632243c22933ad415452c23c1f23ed79c03fd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7de8ae4f68b5ea9cb44c08f0cb2632243c22933ad415452c23c1f23ed79c03fd.exe
Resource
win10v2004-20220901-en
General
-
Target
7de8ae4f68b5ea9cb44c08f0cb2632243c22933ad415452c23c1f23ed79c03fd
-
Size
448KB
-
MD5
a4af70c88b299e305716fd1b3cb565bb
-
SHA1
28da17422c86092ad96c7379d9fd6630d726f6bd
-
SHA256
7de8ae4f68b5ea9cb44c08f0cb2632243c22933ad415452c23c1f23ed79c03fd
-
SHA512
74cf0ccaee8b2b312e3a8b9ca0bef31c6f5c9a9f3161210509d734f9ebe69ff135aa9d0286c76d3a34f3572550befb860d8ab7c69c010740459c7c972c500cda
-
SSDEEP
12288:Yz3ujdIrDsGUWDUf+m9bf3ALBqsMB9ZznPnNq:QrIJT2m9TAlrqDPnc
Malware Config
Signatures
Files
-
7de8ae4f68b5ea9cb44c08f0cb2632243c22933ad415452c23c1f23ed79c03fd.exe windows x86
dd77c91c075e695c78e4499488c7f28d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetACP
CreateFileA
HeapValidate
CloseHandle
RtlUnwind
GetOEMCP
FileTimeToLocalFileTime
GetCurrentProcess
GetFileType
VirtualAlloc
InterlockedIncrement
HeapDestroy
HeapReAlloc
GetCurrentThread
IsValidLocale
GetConsoleOutputCP
FreeEnvironmentStringsA
TlsGetValue
GetModuleFileNameA
FreeLibrary
WideCharToMultiByte
TlsFree
GetCommandLineA
GetModuleFileNameW
Sleep
LoadLibraryA
GetTickCount
GetSystemTimeAsFileTime
GetLocaleInfoA
EnumSystemLocalesA
GetTimeFormatA
QueryPerformanceCounter
RaiseException
LCMapStringA
TlsSetValue
lstrlenA
OutputDebugStringA
EnterCriticalSection
HeapAlloc
GetEnvironmentStrings
HeapFree
CreateSemaphoreW
SetStdHandle
GetCurrentProcessId
EnumResourceNamesA
GetProcessHeap
SetUnhandledExceptionFilter
LoadLibraryW
GetStringTypeW
DeleteCriticalSection
GetConsoleCP
GetStartupInfoA
FreeEnvironmentStringsW
SetFilePointer
WriteConsoleW
InterlockedCompareExchange
CompareStringA
SetLastError
SetHandleCount
SetEnvironmentVariableA
GetCurrentDirectoryW
GetVersionExA
WriteFile
TlsAlloc
FlushFileBuffers
DebugBreak
GetStringTypeA
GetProcAddress
GetConsoleMode
GetDateFormatA
CompareStringW
HeapSize
InterlockedExchange
UnhandledExceptionFilter
SetConsoleCtrlHandler
GetEnvironmentStringsW
VirtualQuery
OutputDebugStringW
MultiByteToWideChar
EnumResourceNamesW
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
GetUserDefaultLCID
GetLastError
TerminateProcess
GetCPInfo
HeapCreate
GetProcessHeaps
VirtualFree
IsBadReadPtr
GetLocaleInfoW
GetStdHandle
LCMapStringW
ExitProcess
InterlockedDecrement
WriteConsoleA
GetTimeZoneInformation
GetModuleHandleA
GetModuleHandleW
CreateEventW
LeaveCriticalSection
IsDebuggerPresent
IsValidCodePage
wininet
InternetOpenUrlW
FtpOpenFileW
InternetConfirmZoneCrossingW
InternetGoOnlineW
InternetAlgIdToStringW
InternetSetOptionExW
HttpQueryInfoA
DeleteUrlCacheEntryA
GetUrlCacheEntryInfoExW
InternetConfirmZoneCrossingA
FindFirstUrlCacheEntryA
UnlockUrlCacheEntryFileA
CreateUrlCacheEntryA
InternetSetOptionExA
FtpOpenFileA
IsUrlCacheEntryExpiredA
FindNextUrlCacheGroup
GetUrlCacheGroupAttributeA
InternetSetDialStateA
SetUrlCacheEntryInfoW
FtpFindFirstFileA
SetUrlCacheEntryInfoA
user32
GetMenuBarInfo
GetClientRect
InvertRect
GetClipboardFormatNameW
DdeQueryStringA
SetLastErrorEx
DdeKeepStringHandle
IsDialogMessage
CreateDesktopW
GetMenuItemCount
ValidateRgn
GetWindow
Sections
.text Size: 285KB - Virtual size: 285KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 153KB - Virtual size: 153KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ