Static task
static1
Behavioral task
behavioral1
Sample
7bf29fc3e09fa211d3473e5dcc75ccb5af818acd1167bfa6261fb6e1cbace042.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7bf29fc3e09fa211d3473e5dcc75ccb5af818acd1167bfa6261fb6e1cbace042.exe
Resource
win10v2004-20220812-en
General
-
Target
7bf29fc3e09fa211d3473e5dcc75ccb5af818acd1167bfa6261fb6e1cbace042
-
Size
40KB
-
MD5
ec7cb550ea81fb37cb32b554447c324a
-
SHA1
940143ee05501a3081a34456f7e59589d65ba9d4
-
SHA256
7bf29fc3e09fa211d3473e5dcc75ccb5af818acd1167bfa6261fb6e1cbace042
-
SHA512
c218f6079e54bc74cb60c3889adf3616d8a8433ffe0944a372f4a304ba4cf9bdb05218412439d894875d338757193c71bc7590d056305c97a4a493c57963f670
-
SSDEEP
768:r7+kabfs3o2LfEV0mF82DmOVkFP6Gw7fx55QOssBUaDh:2Ng39LfECRSVkFP6HJ55nDh
Malware Config
Signatures
Files
-
7bf29fc3e09fa211d3473e5dcc75ccb5af818acd1167bfa6261fb6e1cbace042.exe windows x86
7d0955069f117953f4e14a7f094f1811
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateFileA
DeleteFileA
ExitProcess
FindClose
GetFileSize
GetFileType
GetProcAddress
LoadLibraryA
ReadFile
SetEndOfFile
SetFilePointer
TerminateThread
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObject
WinExec
WriteFile
user32
BeginPaint
BeginPaint
CheckMenuRadioItem
CheckRadioButton
CreateMenu
CreateWindowExA
DestroyCursor
DestroyWindow
EndPaint
ExitWindowsEx
FindWindowExA
GetCapture
GetCursorPos
GetDC
GetDesktopWindow
GetSystemMetrics
GetWindow
GetWindowDC
GetWindowTextA
GetWindowTextLengthA
InvalidateRect
IsWindow
KillTimer
LoadCursorA
LoadIconA
LoadStringA
MessageBoxA
PeekMessageA
PostMessageA
PostQuitMessage
RegisterClassA
ReleaseCapture
ReleaseDC
SendMessageA
SetCursor
SetForegroundWindow
SetMenu
SetMenuItemInfoA
SetPropA
SetScrollPos
SetScrollRange
ValidateRect
WaitMessage
wvsprintfA
gdi32
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
CreateRectRgn
CreateSolidBrush
DeleteDC
DeleteObject
SetPixel
shell32
SHBrowseForFolder
ShellExecuteA
SHGetPathFromIDList
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
CODE Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ