Static task
static1
Behavioral task
behavioral1
Sample
75e9fcffd229662d8b9d31a16be9b6040c48b77b3febfb5189a9492a6cece895.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
75e9fcffd229662d8b9d31a16be9b6040c48b77b3febfb5189a9492a6cece895.exe
Resource
win10v2004-20220812-en
General
-
Target
75e9fcffd229662d8b9d31a16be9b6040c48b77b3febfb5189a9492a6cece895
-
Size
425KB
-
MD5
50bfaca2cddcdb60361b9f1036ca7ec1
-
SHA1
b8d16bdc5b6d61950df39ca75e011f8b4891f0d0
-
SHA256
75e9fcffd229662d8b9d31a16be9b6040c48b77b3febfb5189a9492a6cece895
-
SHA512
2d8b2800aea4f96b7b183202ff62046d8daca00f039c13d3c23fcdc3c38817ad30f6b8e25b1faa3236b782b834e0a722d714dba31f2837c8210b144c4f429417
-
SSDEEP
12288:MDBIj9uzGQxkfp1UTPXfxPXrrWXN1B5wZjeOMNlkePg:Mci61CPXfxyYjeXNF
Malware Config
Signatures
Files
-
75e9fcffd229662d8b9d31a16be9b6040c48b77b3febfb5189a9492a6cece895.exe windows x86
8703515456f1aeeaf389bd216d7da4bd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
AddAtomW
GetTimeZoneInformation
GetLocalTime
RtlUnwind
GetLocaleInfoA
AllocConsole
GetCurrentProcess
GetConsoleOutputCP
VirtualAlloc
HeapSize
WriteConsoleW
HeapReAlloc
GetCPInfo
FindResourceExA
GetACP
CreateFileA
SetLastError
GetModuleFileNameA
DeleteCriticalSection
TlsFree
SetHandleCount
FlushFileBuffers
GetFileType
SetEnvironmentVariableA
LoadLibraryA
GetTickCount
GetSystemTimeAsFileTime
GetCurrentThread
CompareStringW
GetStartupInfoA
QueryPerformanceCounter
LCMapStringW
lstrlenA
SetStdHandle
VirtualFree
IsValidLocale
CloseHandle
HeapAlloc
GetConsoleCP
HeapFree
EnumSystemLocalesW
RaiseException
GetCurrentProcessId
SetComputerNameA
GetLocaleInfoW
SetConsoleCtrlHandler
IsDebuggerPresent
GetProcessHeap
WriteFile
FreeEnvironmentStringsW
GetModuleFileNameW
DebugBreak
MultiByteToWideChar
TlsSetValue
GetLogicalDriveStringsW
lstrcpy
OutputDebugStringW
OutputDebugStringA
LoadLibraryW
SetUnhandledExceptionFilter
MoveFileW
UnhandledExceptionFilter
SetFilePointer
GetDateFormatA
VirtualQueryEx
GetOEMCP
GetProcAddress
FreeLibrary
GetCommandLineW
FlushInstructionCache
GetTimeFormatA
InterlockedExchange
Sleep
LeaveCriticalSection
GetConsoleMode
VirtualQuery
LCMapStringA
IsValidCodePage
WriteConsoleInputW
GetUserDefaultLCID
GetCurrentThreadId
GetStdHandle
GetLogicalDriveStringsA
TerminateProcess
EnumSystemLocalesA
GetStringTypeA
HeapCreate
TlsAlloc
HeapValidate
GetEnvironmentStringsW
GetModuleHandleW
GetPrivateProfileIntW
ExitProcess
HeapDestroy
TlsGetValue
WriteConsoleA
GetModuleHandleA
GetLastError
CompareStringA
IsBadReadPtr
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
GetStringTypeW
GetStartupInfoW
WideCharToMultiByte
EnumResourceTypesA
InterlockedIncrement
gdi32
StretchDIBits
Escape
GetBitmapDimensionEx
GetGlyphOutlineA
OffsetClipRgn
Polyline
GdiFlush
WidenPath
SetBitmapBits
SetPixelFormat
CreateColorSpaceW
DeleteObject
CreateMetaFileW
InvertRgn
GetAspectRatioFilterEx
EnumFontsW
CombineRgn
GetTextExtentExPointW
SetMetaFileBitsEx
StretchBlt
CopyEnhMetaFileA
user32
CreateDialogParamA
DrawTextExA
RedrawWindow
InsertMenuItemW
LoadKeyboardLayoutW
InflateRect
InsertMenuW
CopyImage
CharUpperBuffW
BeginPaint
Sections
.text Size: 243KB - Virtual size: 242KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 177KB - Virtual size: 199KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ