Static task
static1
Behavioral task
behavioral1
Sample
75ff668d354e80701f33ea35048e2503e95eb6d437b13f440f1186a03f2f9283.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
75ff668d354e80701f33ea35048e2503e95eb6d437b13f440f1186a03f2f9283.exe
Resource
win10v2004-20220901-en
General
-
Target
75ff668d354e80701f33ea35048e2503e95eb6d437b13f440f1186a03f2f9283
-
Size
326KB
-
MD5
ac8144f7bcca50e5981ece2e22b8f16e
-
SHA1
a444d47829d84e6d033ea23f36fc30073b773722
-
SHA256
75ff668d354e80701f33ea35048e2503e95eb6d437b13f440f1186a03f2f9283
-
SHA512
0d3e03bca47878d3e972538d937cb508811df8876e932632eb11162494665b95dde57d217bada474b871cf61ca1650c5e1cb537b673bd3e5e453cd5df92695b3
-
SSDEEP
6144:6zOEkxy4Q52rEDXHZFsJKxmGF+JeqPwG/36YkGV48OhBdi0Y9lMPJ4grvUb7KggL:qOEkxybua5KDGMYqYG/K1GGrdiJ9lMJB
Malware Config
Signatures
Files
-
75ff668d354e80701f33ea35048e2503e95eb6d437b13f440f1186a03f2f9283.exe windows x86
fcc04fffbb567d080d290ff500b4ae3a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
PaintDesktop
SetDlgItemTextW
DestroyMenu
SetFocus
SetThreadDesktop
LoadKeyboardLayoutA
WinHelpA
SetClassLongA
ClientToScreen
GetThreadDesktop
ActivateKeyboardLayout
GetCursorInfo
IsWindowEnabled
advapi32
RegCloseKey
RegEnumKeyA
RegQueryValueExA
ReportEventA
RegRestoreKeyW
LookupAccountNameA
LookupPrivilegeDisplayNameW
gdi32
CombineRgn
SetDeviceGammaRamp
SetBkMode
SetICMMode
GetBitmapBits
ExtTextOutA
CreateScalableFontResourceA
SetWindowOrgEx
PlgBlt
SetColorSpace
AbortPath
SetDIBColorTable
SetSystemPaletteUse
UnrealizeObject
wininet
InternetGoOnline
FindFirstUrlCacheEntryExW
RetrieveUrlCacheEntryFileW
InternetSecurityProtocolToStringA
GopherGetAttributeA
kernel32
GetUserDefaultLCID
SetFilePointer
FlushFileBuffers
ExitProcess
SetHandleCount
GetStringTypeA
HeapValidate
InterlockedDecrement
GetSystemTimeAsFileTime
TlsFree
GetLocaleInfoA
GetEnvironmentStringsW
GetFileType
GetACP
GetDateFormatA
TerminateProcess
GetTickCount
LCMapStringW
MultiByteToWideChar
SetStdHandle
GetLocaleInfoW
GetVersionExW
CreateNamedPipeA
WideCharToMultiByte
HeapFree
GetModuleFileNameA
VirtualProtect
CompareStringA
GetModuleHandleA
IsBadWritePtr
VirtualQuery
GetTimeZoneInformation
HeapAlloc
GetExitCodeProcess
SetComputerNameW
GetCPInfo
OutputDebugStringA
TlsGetValue
CompareStringW
WriteFile
IsValidCodePage
TlsSetValue
GetTimeFormatA
InterlockedExchange
LoadLibraryA
VirtualFree
DebugBreak
EnterCriticalSection
SetEnvironmentVariableA
DeleteCriticalSection
CloseHandle
HeapReAlloc
GetProcAddress
GetEnvironmentStrings
HeapDestroy
GetOEMCP
GetSystemInfo
LCMapStringA
IsBadReadPtr
GetLastError
VirtualAlloc
GetStartupInfoA
LeaveCriticalSection
EnumSystemLocalesA
WaitForSingleObject
GetCurrentThreadId
UnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentThread
RtlUnwind
InterlockedIncrement
GetFullPathNameW
GetStdHandle
LocalFree
IsValidLocale
GetCommandLineA
InitializeCriticalSection
GetCurrentProcessId
GetCurrentProcess
FreeEnvironmentStringsA
GetVersionExA
SetLastError
SetConsoleCtrlHandler
FreeEnvironmentStringsW
HeapCreate
TlsAlloc
GetStringTypeW
Sections
.text Size: 179KB - Virtual size: 178KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 145KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ