Static task
static1
Behavioral task
behavioral1
Sample
7ba4e65d42b041a619c061d2b4e7962df4e35ccf709fa4971e98635819f22483.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7ba4e65d42b041a619c061d2b4e7962df4e35ccf709fa4971e98635819f22483.exe
Resource
win10v2004-20220901-en
General
-
Target
7ba4e65d42b041a619c061d2b4e7962df4e35ccf709fa4971e98635819f22483
-
Size
624KB
-
MD5
754bfb88d70e91a31b9476e6e279210b
-
SHA1
55443e30a3193e43be190bec369fea4504b92541
-
SHA256
7ba4e65d42b041a619c061d2b4e7962df4e35ccf709fa4971e98635819f22483
-
SHA512
e0ad7e0cd9a361feac523d38549892b7935b5d44d1eeb70bb5940108dde000f709e47df02263d5f57f56ae296a70e464a4142e02eca269d4fc3e5c0cd85ba4e4
-
SSDEEP
12288:72HosY2bKa9JwS6sk34KjTPXJrYhCSkIJUb/KB:WJ5wnfj7XJrmF8w
Malware Config
Signatures
Files
-
7ba4e65d42b041a619c061d2b4e7962df4e35ccf709fa4971e98635819f22483.exe windows x86
af9b43d5f2084b853209662c134b7cc7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_AddIcon
ImageList_GetBkColor
ImageList_GetImageInfo
ImageList_Copy
CreatePropertySheetPageA
ImageList_Duplicate
ImageList_BeginDrag
InitCommonControlsEx
DrawStatusTextA
ImageList_LoadImage
CreateStatusWindowW
ImageList_Merge
ImageList_SetOverlayImage
ImageList_LoadImageA
CreateUpDownControl
ImageList_DragLeave
ImageList_Remove
user32
RegisterClassExA
RegisterClassA
CreateWindowExA
CharToOemA
ShowCursor
SetClassLongW
AppendMenuW
DestroyWindow
CreateCaret
CharToOemBuffA
VkKeyScanA
DdeGetLastError
DefWindowProcW
GetMenuStringA
DdeUnaccessData
GetSystemMenu
PeekMessageW
ValidateRect
InsertMenuItemW
OpenDesktopW
GetGuiResources
HideCaret
MessageBoxA
IsChild
ShowWindow
InvalidateRgn
shell32
DoEnvironmentSubstA
SHGetFileInfoW
SHGetPathFromIDList
comdlg32
GetOpenFileNameA
LoadAlterBitmap
kernel32
ExitProcess
SetEnvironmentVariableA
RtlUnwind
TlsSetValue
GetConsoleMode
HeapAlloc
HeapCreate
GetModuleHandleW
QueryPerformanceCounter
EnumSystemLocalesA
VirtualFree
LoadLibraryA
GetOEMCP
FlushFileBuffers
HeapFree
GetStringTypeA
Sleep
LCMapStringA
LeaveCriticalSection
GetUserDefaultLCID
WriteConsoleW
GetCommandLineA
TerminateProcess
WriteProfileStringW
TlsFree
SetStdHandle
CreateSemaphoreW
GetCurrentProcess
TlsAlloc
LocalShrink
MultiByteToWideChar
InterlockedIncrement
WriteFile
DeleteCriticalSection
VirtualFreeEx
GetFileType
InterlockedDecrement
CreateMutexA
GetConsoleOutputCP
IsValidLocale
GlobalGetAtomNameA
OpenMutexA
LCMapStringW
HeapDestroy
GetDateFormatA
InitializeCriticalSectionAndSpinCount
WideCharToMultiByte
VirtualAlloc
GetTimeZoneInformation
CompareStringA
WriteConsoleA
GetSystemTimeAsFileTime
SetConsoleCtrlHandler
GetTimeFormatA
SetLastError
GetACP
TlsGetValue
GetStartupInfoA
GetTickCount
HeapReAlloc
GetThreadContext
GetStdHandle
GetModuleFileNameA
InterlockedExchange
GetCurrentProcessId
VirtualQuery
GetLocaleInfoW
FreeLibrary
IsValidCodePage
GetLocaleInfoA
CloseHandle
GetCurrentThread
CompareStringW
IsDebuggerPresent
GetEnvironmentStringsW
SetFilePointer
GetConsoleCP
GetEnvironmentStrings
HeapSize
GetModuleHandleA
GetProcAddress
GetCPInfo
GetLastError
GetCurrentThreadId
SetHandleCount
FreeEnvironmentStringsW
FreeEnvironmentStringsA
SetUnhandledExceptionFilter
EnterCriticalSection
GetStringTypeW
CreateFileA
UnhandledExceptionFilter
ReadFile
advapi32
GetUserNameA
LookupPrivilegeNameA
Sections
.text Size: 164KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 264KB - Virtual size: 261KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ