Static task
static1
Behavioral task
behavioral1
Sample
7373a07161567899a63e35abe08d0d326b6484f0729936db555c2f1d1409304f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7373a07161567899a63e35abe08d0d326b6484f0729936db555c2f1d1409304f.exe
Resource
win10v2004-20220901-en
General
-
Target
7373a07161567899a63e35abe08d0d326b6484f0729936db555c2f1d1409304f
-
Size
352KB
-
MD5
6717631c368726273d1d8cc2646d50a6
-
SHA1
77ce2348a846edb3df58a647494e38202aa5393d
-
SHA256
7373a07161567899a63e35abe08d0d326b6484f0729936db555c2f1d1409304f
-
SHA512
4f626f7f9736b6bdee69f0b3f322ce4e8afccc665c53276dca406cdc5dabd80fec3aa46bdc871137da49ec745c593157a6a317df456a5a89766cde573c0588f1
-
SSDEEP
3072:NFKUnTp5sNokENgjn+qHtzcIM+Amn9qg2SSGf417ffxOgPkAGEq4S1aunWLEYUce:bKUT8NokEKj+UcFOy3qh1Jm
Malware Config
Signatures
Files
-
7373a07161567899a63e35abe08d0d326b6484f0729936db555c2f1d1409304f.exe windows x86
325d5ff13e31e181feb955b7c5f47168
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CompareStringW
Sleep
GetTempPathA
SetNamedPipeHandleState
DuplicateHandle
CreatePipe
SetFilePointer
CreateFileA
GetExitCodeProcess
ReadFile
FlushFileBuffers
WriteFile
LocalFree
LocalAlloc
GetCurrentThread
GetProcAddress
GetModuleHandleA
GetUserDefaultLangID
GetModuleFileNameA
CompareStringA
GetCurrentProcessId
FreeLibrary
LoadLibraryW
GetCurrentProcess
GetStartupInfoA
CreateProcessA
WaitForSingleObject
CloseHandle
GetCommandLineA
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
GetLastError
InterlockedExchange
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
SetEndOfFile
LoadLibraryA
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetTimeZoneInformation
LCMapStringW
LCMapStringA
GetStdHandle
SetHandleCount
GetCPInfo
GetOEMCP
SetUnhandledExceptionFilter
TerminateProcess
IsBadWritePtr
GetACP
VirtualFree
HeapCreate
ExitProcess
GetDateFormatA
GetTimeFormatA
GetSystemTimeAsFileTime
GetFileType
SetStdHandle
RtlUnwind
VirtualQuery
EnterCriticalSection
LeaveCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
VirtualProtect
VirtualAlloc
GetSystemInfo
SetEnvironmentVariableA
advapi32
ImpersonateSelf
RegCloseKey
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExW
OpenThreadToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
FreeSid
RevertToSelf
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyA
RegQueryValueExA
user32
SendMessageA
CreateDialogParamA
ShowWindow
IsDialogMessageA
TranslateMessage
DispatchMessageA
PeekMessageA
MsgWaitForMultipleObjects
GetDlgItem
DestroyWindow
SetDlgItemTextA
GetDesktopWindow
GetWindowRect
CopyRect
OffsetRect
SetWindowPos
PostQuitMessage
MessageBoxA
ExitWindowsEx
comctl32
ord17
Sections
.text Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 280KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE