Static task
static1
Behavioral task
behavioral1
Sample
7e7a147302bd84c4c6c69737df0cce739bcc2c60018e7a38c74675b46ad9a1ad.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7e7a147302bd84c4c6c69737df0cce739bcc2c60018e7a38c74675b46ad9a1ad.exe
Resource
win10v2004-20220812-en
General
-
Target
7e7a147302bd84c4c6c69737df0cce739bcc2c60018e7a38c74675b46ad9a1ad
-
Size
103KB
-
MD5
5141291cc050c0a452a1a5dd694a3eee
-
SHA1
6cd8744d842aa5c36f8dda85b0c4f48bc5605bc4
-
SHA256
7e7a147302bd84c4c6c69737df0cce739bcc2c60018e7a38c74675b46ad9a1ad
-
SHA512
31555b6c22f4938afc95a5087b51af62016a6e2bfea850b59ad7812eebc3be60de3601f115718f1e0776848d06d2784c942bb402ac0e1d6339069768a1400037
-
SSDEEP
3072:IUF4z+8zXEzs242C22wU22222v2J24262D22tyNYGurBV:IUeXC4krT
Malware Config
Signatures
Files
-
7e7a147302bd84c4c6c69737df0cce739bcc2c60018e7a38c74675b46ad9a1ad.exe windows x86
4aaab58c35bd58b8bb41804abeafef55
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnlockFileEx
DeleteFileA
LockFileEx
GetModuleHandleA
GetTempPathA
InterlockedExchange
Sleep
InterlockedCompareExchange
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
LoadLibraryA
GetProcAddress
FormatMessageA
LocalFree
FreeLibrary
WideCharToMultiByte
GetCurrentThread
GetFileAttributesA
CloseHandle
VirtualFree
ReadFile
WriteFile
CreateFileA
GetLastError
VirtualAlloc
VirtualAllocEx
LoadLibraryW
GetFullPathNameW
GetEnvironmentStringsW
DebugActiveProcess
IsBadWritePtr
PeekConsoleInputA
SetSystemPowerState
lstrcmpiA
GetNamedPipeInfo
SetCommConfig
BuildCommDCBW
GetSystemWow64DirectoryA
CreateProcessInternalW
WriteProfileStringA
FillConsoleOutputAttribute
WriteConsoleInputVDMW
RtlMoveMemory
ReadConsoleA
GetDateFormatW
GetCommMask
OpenSemaphoreA
RequestWakeupLatency
GlobalSize
GlobalUnlock
GetCalendarInfoW
lstrcpyA
Thread32Next
BindIoCompletionCallback
FindAtomA
LocalCompact
CreateTimerQueueTimer
Process32NextW
Thread32First
SetComputerNameA
LocalLock
ReadConsoleOutputAttribute
DisconnectNamedPipe
ResetWriteWatch
SetThreadExecutionState
QueryActCtxW
GetNumberFormatW
BaseCleanupAppcompatCacheSupport
SetSystemTimeAdjustment
SetEndOfFile
GetExpandedNameA
GetProcessAffinityMask
lstrcmpi
WritePrivateProfileSectionW
EnumerateLocalComputerNamesA
CreateJobObjectW
SetConsoleInputExeNameA
SetTapeParameters
DefineDosDeviceW
CreateSemaphoreA
FindResourceExW
lstrcmp
CreateFileMappingA
OpenWaitableTimerW
InterlockedExchangeAdd
IsProcessorFeaturePresent
GetNativeSystemInfo
GlobalAddAtomA
GetSystemWow64DirectoryW
UnregisterConsoleIME
UnlockFile
FreeConsole
IsValidLanguageGroup
ShowConsoleCursor
RestoreLastError
CommConfigDialogA
CreateTimerQueue
LZCopy
ZombifyActCtx
SetCalendarInfoW
lstrcatW
GetConsoleProcessList
Heap32ListFirst
RegisterConsoleOS2
GetDateFormatA
FlushFileBuffers
TerminateJobObject
MoveFileExA
SetConsoleOS2OemFormat
SetDefaultCommConfigW
FindFirstVolumeMountPointA
SetupComm
SetWaitableTimer
EndUpdateResourceW
FindAtomW
ReleaseSemaphore
GetConsoleCursorMode
Module32First
BackupSeek
SetComputerNameW
WriteFileGather
ReadConsoleInputA
SetFileShortNameA
IsBadCodePtr
WriteFileEx
SystemTimeToTzSpecificLocalTime
OpenJobObjectW
OpenEventA
GetPrivateProfileIntA
VerLanguageNameA
DeactivateActCtx
HeapUnlock
CloseProfileUserMapping
GetHandleContext
SetConsoleTitleW
InterlockedFlushSList
CreateActCtxW
GetLogicalDriveStringsA
GetNumberOfConsoleMouseButtons
SetPriorityClass
_lopen
VerifyVersionInfoA
EnumSystemCodePagesW
CreatePipe
GetDiskFreeSpaceW
GetPrivateProfileStructA
LoadModule
SetDefaultCommConfigA
ContinueDebugEvent
SetLocalPrimaryComputerNameA
CreateJobObjectA
GetNumberOfConsoleFonts
DeleteFileW
GetVolumeNameForVolumeMountPointA
GlobalCompact
GetConsoleHardwareState
RequestDeviceWakeup
CreateProcessInternalA
GetThreadPriority
GetFileInformationByHandle
FatalAppExitW
GetConsoleAliasesLengthW
CancelTimerQueueTimer
AreFileApisANSI
FindResourceW
SetTimeZoneInformation
CopyFileExA
SetConsoleOutputCP
SetFileValidData
GetVolumePathNamesForVolumeNameW
GetProfileStringW
GetVolumeInformationW
GetCurrentConsoleFont
GlobalDeleteAtom
EscapeCommFunction
SetFileAttributesW
CreateJobSet
HeapSummary
lstrcmpW
GetWriteWatch
FoldStringW
GetStartupInfoW
IsValidLocale
GetConsoleFontInfo
advapi32
AccessCheck
GetFileSecurityA
RevertToSelf
ImpersonateSelf
OpenThreadToken
MapGenericMask
mpr
WNetAddConnection2A
WNetCancelConnection2A
user32
DdeUnaccessData
SetDlgItemInt
CharUpperBuffA
WinHelpA
GetMenuItemCount
RegisterClassExW
ChangeDisplaySettingsW
RealChildWindowFromPoint
GetClassLongA
SetWindowTextW
TileChildWindows
GetAncestor
GetDlgItemInt
IsMenu
GetParent
FindWindowExW
GetWindowPlacement
DestroyIcon
GetPriorityClipboardFormat
GetQueueStatus
QuerySendMessage
SetShellWindowEx
DdeAbandonTransaction
IMPQueryIMEA
EndPaint
DispatchMessageW
RegisterRawInputDevices
GetScrollInfo
BringWindowToTop
CallMsgFilter
GetMonitorInfoW
FreeDDElParam
BroadcastSystemMessage
SetWindowPlacement
SetMenuContextHelpId
CharPrevW
SendNotifyMessageW
OpenIcon
IsWindow
SetProcessWindowStation
EnableMenuItem
GetClassWord
EnumThreadWindows
DrawTextExA
LoadCursorFromFileA
VkKeyScanExA
LoadKeyboardLayoutEx
RegisterClassExA
GetTitleBarInfo
DdeNameService
DrawCaption
OffsetRect
GetRegisteredRawInputDevices
GetClassInfoExA
UnpackDDElParam
CopyRect
ReasonCodeNeedsComment
FindWindowExA
CreateMenu
FlashWindowEx
comdlg32
PrintDlgW
GetFileTitleA
msls31
LssbGetVisibleDcpInSubline
LsLwMultDivR
LsCompressSubline
LsGetReverseLsimethods
LsModifyLineHeight
LsdnFinishByOneChar
LsFetchAppendToCurrentSubline
LssbFDonePresSubline
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.pdata Size: 2KB - Virtual size: 175KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 58KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ