Static task
static1
Behavioral task
behavioral1
Sample
786d6186f3b553de3bb634bb0c7ee75257d574eb956167a0f3c062bae9420f01.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
786d6186f3b553de3bb634bb0c7ee75257d574eb956167a0f3c062bae9420f01.exe
Resource
win10v2004-20220812-en
General
-
Target
786d6186f3b553de3bb634bb0c7ee75257d574eb956167a0f3c062bae9420f01
-
Size
442KB
-
MD5
bdaecbb43296cdf03bf85c81a2cd9177
-
SHA1
cc1c4b8951f5b1164d180b325da9835448259303
-
SHA256
786d6186f3b553de3bb634bb0c7ee75257d574eb956167a0f3c062bae9420f01
-
SHA512
4a209633328be44aaa2ebc0a8d06933fb369d63033c316a8aa2c969cff13329cfc63f199b86774c65690914f2552cc745221a73d2c59a9eedb0278e1448cb6e5
-
SSDEEP
12288:6je89ge6ncU/G4URzwLkNZRi0eIgfJz0:OwcU/eRzwwW3IcZ0
Malware Config
Signatures
Files
-
786d6186f3b553de3bb634bb0c7ee75257d574eb956167a0f3c062bae9420f01.exe windows x86
11865200561ca4b7c6c7392778dd0bfe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
CryptSetProviderExW
CryptGetHashParam
InitiateSystemShutdownW
InitializeSecurityDescriptor
RegQueryInfoKeyW
user32
SendMessageA
GetClipboardFormatNameA
TabbedTextOutA
MessageBoxA
GetCursorInfo
SetDoubleClickTime
DdeSetUserHandle
CreateCaret
MoveWindow
ChangeMenuA
DefFrameProcW
DdeQueryStringA
LoadBitmapA
CreateDialogIndirectParamW
DdeReconnect
shell32
FreeIconList
SHGetDataFromIDListA
DoEnvironmentSubstA
ExtractAssociatedIconExA
SHChangeNotify
ExtractIconW
SHGetInstanceExplorer
FindExecutableW
DragQueryFileA
SHBrowseForFolderW
SHGetDataFromIDListW
ShellExecuteEx
SHGetFileInfoA
SHEmptyRecycleBinA
ExtractAssociatedIconA
SHGetPathFromIDListA
RealShellExecuteExA
wininet
FindFirstUrlCacheContainerW
InternetSetOptionExA
kernel32
HeapSize
TlsGetValue
GetCommandLineW
ExitProcess
TlsSetValue
GetTimeFormatA
IsDebuggerPresent
IsValidLocale
GetSystemTimeAsFileTime
WriteFile
GetStartupInfoA
CompareStringA
GetModuleHandleW
GetEnvironmentStringsW
GetLocaleInfoW
TerminateProcess
GetTickCount
SetHandleCount
SetUnhandledExceptionFilter
VirtualFree
GetStartupInfoW
GetPrivateProfileSectionNamesA
SystemTimeToFileTime
WideCharToMultiByte
HeapFree
GetModuleFileNameA
InterlockedDecrement
EnterCriticalSection
GetModuleHandleA
LeaveCriticalSection
VirtualQuery
HeapDestroy
HeapAlloc
UnmapViewOfFile
CompareStringW
GetFileType
Sleep
InitializeCriticalSectionAndSpinCount
EnumSystemLocalesA
GetTimeZoneInformation
MultiByteToWideChar
UnhandledExceptionFilter
HeapCreate
InterlockedExchange
LoadLibraryA
GetDateFormatA
FreeEnvironmentStringsW
GetACP
TlsFree
FreeLibrary
DeleteCriticalSection
HeapReAlloc
GetProcAddress
GetModuleFileNameW
InterlockedIncrement
GetStdHandle
GetUserDefaultLCID
SetEnvironmentVariableA
LCMapStringW
GetOEMCP
VirtualAlloc
GetStringTypeA
SetLastError
GetCPInfo
GetLongPathNameW
GetCurrentThreadId
TlsAlloc
QueryPerformanceCounter
GetLocaleInfoA
RtlUnwind
LCMapStringA
RemoveDirectoryA
GetStringTypeW
GetCurrentDirectoryA
SetConsoleCtrlHandler
GetLastError
IsValidCodePage
GetCurrentProcessId
GetCurrentProcess
GetCurrentThread
Sections
.text Size: 122KB - Virtual size: 122KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 310KB - Virtual size: 310KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ