Static task
static1
Behavioral task
behavioral1
Sample
76ca5b90f88051cece8ba79417aeae96d1723b2af986bd7a7fe2d0db255e5f53.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
76ca5b90f88051cece8ba79417aeae96d1723b2af986bd7a7fe2d0db255e5f53.exe
Resource
win10v2004-20220901-en
General
-
Target
76ca5b90f88051cece8ba79417aeae96d1723b2af986bd7a7fe2d0db255e5f53
-
Size
710KB
-
MD5
671cfe3275e1890f683795105a76aeb0
-
SHA1
80c6601eb85dfd49002cc8ea078fca59bf286e01
-
SHA256
76ca5b90f88051cece8ba79417aeae96d1723b2af986bd7a7fe2d0db255e5f53
-
SHA512
b291ec52cb5eabef826607277e5332f95d5456437418c2672f3ba62ccb8c27ac31778561045dd04adba213f77dd1a281cf01b64fa9b3705d3447979648ebb18f
-
SSDEEP
12288:3fKcPm/4SCrAZ4Qz0uQSf23mlYzeH3LiteeN67uJTHLdEStAvzTaMJyDh0xhA:3fKcNrAZhzXvH7iteeU7YrdrtgzTaMJM
Malware Config
Signatures
Files
-
76ca5b90f88051cece8ba79417aeae96d1723b2af986bd7a7fe2d0db255e5f53.exe windows x86
bccbdcfd22276acf22fe308f7326d80f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDriveStringsA
IsBadCodePtr
GetComputerNameExW
GetAtomNameW
GlobalAddAtomA
CreateSemaphoreW
ConnectNamedPipe
FindClose
SetVolumeLabelA
CreateTimerQueueTimer
_lread
MoveFileExA
GetThreadTimes
FindNextVolumeMountPointW
DuplicateHandle
MapViewOfFile
GetDiskFreeSpaceW
SetFilePointer
lstrcmpW
UnhandledExceptionFilter
FreeUserPhysicalPages
GetShortPathNameW
SetWaitableTimer
GetFileSizeEx
GetPrivateProfileSectionNamesW
DeleteTimerQueue
FreeEnvironmentStringsW
CreateFileMappingW
SuspendThread
SetSystemTime
CancelWaitableTimer
EscapeCommFunction
EnumUILanguagesA
SetEnvironmentVariableA
WideCharToMultiByte
ChangeTimerQueueTimer
GetCalendarInfoW
LCMapStringA
FindAtomW
GetCurrentThreadId
GetCommMask
_lclose
SetFileAttributesA
FindFirstFileA
GetSystemTimeAdjustment
FindResourceExA
_lwrite
DefineDosDeviceA
BackupSeek
lstrcpynW
SetTapeParameters
IsValidCodePage
GetStringTypeExA
LocalFlags
SetFileAttributesW
IsBadWritePtr
GlobalFree
EnumResourceLanguagesA
GetSystemTime
RemoveDirectoryW
IsValidLanguageGroup
GetVolumeInformationA
EnumResourceNamesW
SetDefaultCommConfigW
IsValidLocale
FindNextVolumeA
lstrcpyW
lstrcpynA
InterlockedIncrement
MoveFileExW
WritePrivateProfileStructA
SetCurrentDirectoryW
GetSystemWindowsDirectoryW
GetFileAttributesW
CreateEventW
GetSystemPowerStatus
IsBadStringPtrA
WritePrivateProfileStringA
SetSystemPowerState
EnumTimeFormatsW
CreateWaitableTimerA
GetCommModemStatus
GetPrivateProfileSectionW
GetCPInfoExW
SetMailslotInfo
GetShortPathNameA
ConvertDefaultLocale
GetPrivateProfileIntW
GetPrivateProfileStringW
GetExitCodeThread
GetWindowsDirectoryW
GetNamedPipeHandleStateW
FatalAppExitA
SetLocaleInfoA
LocalAlloc
GetProcessPriorityBoost
WritePrivateProfileStructW
UpdateResourceA
GetDateFormatW
GlobalGetAtomNameW
QueryPerformanceCounter
UnmapViewOfFile
InterlockedDecrement
GetProfileIntW
GetCPInfo
GetFileTime
GetFileAttributesA
GetDevicePowerState
GetCalendarInfoA
EndUpdateResourceW
GetAtomNameA
shlwapi
PathAppendA
user32
DialogBoxIndirectParamW
DrawAnimatedRects
SetMenuItemInfoA
SetDlgItemTextW
MessageBoxExA
SetActiveWindow
UpdateWindow
CharLowerBuffA
SendMessageCallbackW
RegisterDeviceNotificationW
EnumChildWindows
GetWindowLongA
SetParent
FillRect
MapDialogRect
DlgDirListW
SetThreadDesktop
TrackMouseEvent
GetDesktopWindow
SetWindowContextHelpId
DestroyWindow
GetMenuBarInfo
GetDialogBaseUnits
SetDebugErrorLevel
LoadMenuA
DdeClientTransaction
Sections
.text Size: 227KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 273KB - Virtual size: 656KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 205KB - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ