Static task
static1
Behavioral task
behavioral1
Sample
77428ba270736d63be9125f9253590866c63811b6ef03fba0fa2cfd83c8e0016.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
77428ba270736d63be9125f9253590866c63811b6ef03fba0fa2cfd83c8e0016.exe
Resource
win10v2004-20220812-en
General
-
Target
77428ba270736d63be9125f9253590866c63811b6ef03fba0fa2cfd83c8e0016
-
Size
196KB
-
MD5
43921839888d2a9552733793a8a08260
-
SHA1
cbdcc9277e65bff9762e15e4ab01c7ec2f68e277
-
SHA256
77428ba270736d63be9125f9253590866c63811b6ef03fba0fa2cfd83c8e0016
-
SHA512
55f0dbc069a2775eef3e93d86feb747bf5970ed2a9a23831f309bc97016cc0b827931fab6cc9360f45f0379c610a5e94e2d903a0c4056742e227f1c5431d101b
-
SSDEEP
3072:wAg0FudGMGx9YwbgbB7583iSR429cWMWvx7G+zoZSe5OxyYj9/:wAOgMGx9BIlAdi2DZvu55SyYZ
Malware Config
Signatures
Files
-
77428ba270736d63be9125f9253590866c63811b6ef03fba0fa2cfd83c8e0016.exe windows x86
f99e4d9bb0f2b5d1361305b5f71c1f51
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
GetFileSize
CreateFileA
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
MultiByteToWideChar
lstrlenA
GetModuleFileNameA
GetLastError
FreeLibrary
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
DeleteFileA
CreateProcessA
GetCommandLineA
UnmapViewOfFile
GetFileAttributesA
GetTempPathA
WriteFile
GetTempFileNameA
GetProcAddress
GetModuleHandleA
MapViewOfFile
CreateFileMappingA
MulDiv
LocalFree
lstrcmpA
LocalAlloc
GetVersion
LoadLibraryA
WritePrivateProfileSectionA
WaitForSingleObject
CreateSemaphoreA
GetCurrentProcessId
CopyFileA
VirtualQuery
GetSystemInfo
VirtualProtect
CloseHandle
SetFilePointer
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
LCMapStringW
LCMapStringA
HeapSize
IsBadWritePtr
VirtualAlloc
SetUnhandledExceptionFilter
GetCPInfo
GetOEMCP
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
TlsAlloc
TlsGetValue
TlsSetValue
SetLastError
TlsFree
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
TerminateProcess
GetSystemTimeAsFileTime
HeapReAlloc
RaiseException
RtlUnwind
ExitProcess
FlushFileBuffers
SetStdHandle
GetStartupInfoA
GetDriveTypeA
Sleep
GetCurrentThreadId
lstrlenW
HeapAlloc
GetProcessHeap
HeapFree
GetCurrentProcess
FlushInstructionCache
FindResourceA
LoadResource
LockResource
SizeofResource
LeaveCriticalSection
EnterCriticalSection
WideCharToMultiByte
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
user32
CallWindowProcA
DefWindowProcA
SetCursor
ReleaseCapture
SetCapture
EndPaint
BeginPaint
GetSystemMetrics
CharPrevA
SendMessageA
GetActiveWindow
MsgWaitForMultipleObjects
CharNextA
DialogBoxParamA
PeekMessageA
TranslateMessage
DispatchMessageA
GetWindowTextLengthA
MessageBoxA
CreateWindowExA
RegisterClassExA
DestroyWindow
LoadCursorA
wsprintfA
GetClassInfoExA
GetWindow
GetWindowRect
SystemParametersInfoA
GetClientRect
MapWindowPoints
SetWindowPos
GetDlgItem
GetParent
SetDlgItemTextA
GetDlgItemTextA
SetWindowTextA
GetWindowLongA
SetWindowLongA
EndDialog
GetDC
UnregisterClassA
shell32
ShellExecuteA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoUninitialize
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoInitialize
oleaut32
VarUI4FromStr
SysAllocStringLen
SysFreeString
advapi32
RegQueryValueExA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegOpenKeyA
RegDeleteKeyA
RegSetValueExA
gdi32
DeleteObject
CreateFontIndirectA
GetDeviceCaps
Sections
.text Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�%� Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE