Static task
static1
Behavioral task
behavioral1
Sample
7a7e0ddeece8d097ed7671be2e6101efb84f5fd94bbdc0af10f05f4c3af8358e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7a7e0ddeece8d097ed7671be2e6101efb84f5fd94bbdc0af10f05f4c3af8358e.exe
Resource
win10v2004-20220812-en
General
-
Target
7a7e0ddeece8d097ed7671be2e6101efb84f5fd94bbdc0af10f05f4c3af8358e
-
Size
89KB
-
MD5
09af61b492e89efe605401734f243a15
-
SHA1
bcfbae16c2ba29e42c028d09926ae7892cb68cbd
-
SHA256
7a7e0ddeece8d097ed7671be2e6101efb84f5fd94bbdc0af10f05f4c3af8358e
-
SHA512
5a85c26d84624d48e6ee98a2c4025dac61928ff01b1883944d99383cef533a15ae45ce35a1c24f56b74788eff2a2e1de40cbb9000adb030ee323fd1c1cc7e16e
-
SSDEEP
1536:slKHGHbrQVpSvIswv4cbacQazBhV2aSKJvaNYvNPS8kGXSu9s:sXHbrD4v4cb9QazBL2a9JNdxkGTs
Malware Config
Signatures
Files
-
7a7e0ddeece8d097ed7671be2e6101efb84f5fd94bbdc0af10f05f4c3af8358e.exe windows x86
62f3d61645d9aec9377655f3d4210cd2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
Shell_NotifyIconA
SHGetSpecialFolderLocation
SHGetFileInfoA
SHGetDiskFreeSpaceA
DragQueryFileA
msvcrt
strcmp
memcpy
acos
comctl32
ImageList_Add
ImageList_Create
ImageList_GetBkColor
ImageList_Write
ImageList_Remove
ImageList_Draw
ImageList_Read
ImageList_DrawEx
shlwapi
SHSetValueA
SHEnumValueA
SHQueryValueExA
SHDeleteKeyA
PathIsContentTypeA
SHStrDupA
oleaut32
VariantCopyInd
SysFreeString
OleLoadPicture
SafeArrayGetUBound
SafeArrayCreate
GetErrorInfo
SafeArrayUnaccessData
RegisterTypeLib
VariantChangeType
SafeArrayPtrOfIndex
kernel32
VirtualQuery
WideCharToMultiByte
GetACP
LoadLibraryA
GetLocaleInfoA
Sleep
SetErrorMode
SetFilePointer
GlobalAlloc
GetStringTypeW
ResetEvent
FreeLibrary
GetCurrentProcessId
GlobalAddAtomA
GetSystemDefaultLangID
lstrcpyA
VirtualAlloc
SetEndOfFile
GetCPInfo
GetFileAttributesA
CreateFileA
GetModuleHandleA
GetFullPathNameA
HeapAlloc
GetStartupInfoA
LoadResource
GetCurrentThreadId
GlobalFindAtomA
GetStdHandle
lstrlenA
MulDiv
WriteFile
VirtualAllocEx
GetLocalTime
DeleteFileA
GetDiskFreeSpaceA
HeapFree
HeapDestroy
GetStringTypeA
GetTickCount
GetProcAddress
LocalFree
SetLastError
ReadFile
VirtualFree
GetProcessHeap
LocalAlloc
EnterCriticalSection
EnumCalendarInfoA
CreateEventA
GetFileSize
GetOEMCP
InitializeCriticalSection
GetEnvironmentStrings
GetUserDefaultLCID
SizeofResource
CreateThread
GetVersionExA
FindClose
LockResource
LoadLibraryExA
GetCurrentThread
user32
GetDCEx
RegisterClassA
CreatePopupMenu
GetMenuState
DeferWindowPos
ShowWindow
GetDesktopWindow
EqualRect
GetLastActivePopup
GetForegroundWindow
GetClientRect
GetCursor
GetIconInfo
GetCursorPos
GetKeyNameTextA
SetTimer
GetCapture
IsWindowVisible
CharLowerBuffA
GetClassInfoA
DrawFrameControl
GetClassLongA
EndDeferWindowPos
GetClipboardData
SetWindowTextA
DrawMenuBar
IsMenu
GetFocus
CharToOemA
GetDlgItem
GetKeyState
GetDC
CharLowerA
DefFrameProcA
HideCaret
Sections
CODE Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 606B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ