Static task
static1
Behavioral task
behavioral1
Sample
7265272c96c693d71fc3850942b3688610b2dab4ca0328f4ef57b71283404bdd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7265272c96c693d71fc3850942b3688610b2dab4ca0328f4ef57b71283404bdd.exe
Resource
win10v2004-20220812-en
General
-
Target
7265272c96c693d71fc3850942b3688610b2dab4ca0328f4ef57b71283404bdd
-
Size
281KB
-
MD5
6ec06aa5690b8f44c003bf2310270380
-
SHA1
f094386af428da82c93801d79e63eaac8e205438
-
SHA256
7265272c96c693d71fc3850942b3688610b2dab4ca0328f4ef57b71283404bdd
-
SHA512
7a8031cd86057aa59efe478295b1cfd94174b60416fabbb1e2e5a6fbc9720a0e5e40b6ef2b01bf7a15fbd4bd11b80ce1ef65f1cec43ee136ceb4b65a19441725
-
SSDEEP
6144:KsXeMUkYZkDX+ii/JvvD3b+e3tWnOahz7ms48BhvCDc:pOzksk74Bv7rdOFM8Ic
Malware Config
Signatures
Files
-
7265272c96c693d71fc3850942b3688610b2dab4ca0328f4ef57b71283404bdd.exe windows x86
3ee5246d7cbc661af1605bd3be59623b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
VarUI1FromBool
VarCyRound
VarMonthName
VarCyFromI1
VarBoolFromI1
DispInvoke
VarDecFromDate
SafeArrayDestroyDescriptor
VarDateFromR4
VarCyFromI2
VarUI1FromStr
VarDecCmpR8
VarBstrFromI4
VarBoolFromR4
SafeArrayCopy
VarI2FromR4
VarI1FromCy
LPSAFEARRAY_UserFree
GetActiveObject
VarI4FromDate
user32
DrawIconEx
DlgDirSelectComboBoxExW
GetPriorityClipboardFormat
GetUserObjectInformationA
CheckRadioButton
GetWindowModuleFileNameW
SetDoubleClickTime
DdeSetQualityOfService
OpenWindowStationW
PeekMessageW
OpenInputDesktop
FlashWindow
DestroyWindow
GrayStringW
MsgWaitForMultipleObjects
msvcrt
_initterm
__setusermatherr
_adjust_fdiv
__p__fmode
__set_app_type
__getmainargs
_exit
_XcptFilter
exit
_except_handler3
__p__commode
_controlfp
__dllonexit
_onexit
_acmdln
ole32
OleCreateLinkToFile
HBITMAP_UserUnmarshal
CLIPFORMAT_UserMarshal
CoFileTimeNow
ReadFmtUserTypeStg
OleCreateLinkFromData
OleCreateFromData
STGMEDIUM_UserUnmarshal
GetConvertStg
CreateDataCache
CoLockObjectExternal
HWND_UserFree
CoTaskMemFree
HBITMAP_UserFree
gdi32
CopyMetaFileW
Pie
CreateICA
OffsetWindowOrgEx
CreateEllipticRgn
ExtCreateRegion
GetCharWidthFloatW
SaveDC
DeleteEnhMetaFile
TextOutW
GetTextCharsetInfo
kernel32
ExitProcess
GetModuleHandleA
GetStartupInfoA
shell32
SHBrowseForFolderA
SHQueryRecycleBinW
ShellExecuteA
ShellExecuteExA
Shell_NotifyIconA
SHGetSpecialFolderPathA
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ