Static task
static1
Behavioral task
behavioral1
Sample
7790bf1336a8a4415f404654fb06701f56cbb804b000ba5778609bd152bafba9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7790bf1336a8a4415f404654fb06701f56cbb804b000ba5778609bd152bafba9.exe
Resource
win10v2004-20220812-en
General
-
Target
7790bf1336a8a4415f404654fb06701f56cbb804b000ba5778609bd152bafba9
-
Size
109KB
-
MD5
704b22acc52026ab177851298be93db0
-
SHA1
bd1320a447c0345eb660cb04ff79240f729914ee
-
SHA256
7790bf1336a8a4415f404654fb06701f56cbb804b000ba5778609bd152bafba9
-
SHA512
5ce3cfe3a960291aef658c82c2700c366561189390b62926d0874a6c92b36075087e9d8b2e6b3e947325cb33a9044ea4c507bae0d4479ba4f803fae038f2b5e7
-
SSDEEP
3072:UZoYr9/atpneLu7mAKqPrFaORWIdDYDx3sYs:43x/+9ei7mrqzFaRBVv
Malware Config
Signatures
Files
-
7790bf1336a8a4415f404654fb06701f56cbb804b000ba5778609bd152bafba9.exe windows x86
2b73cea0fc60851d92901b62e269fb31
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
strcpy
__getmainargs
_except_handler3
fread
malloc
fwrite
fclose
remove
__setusermatherr
strcmp
__p__environ
__p__commode
strrchr
strstr
free
_XcptFilter
_acmdln
__p__fmode
_adjust_fdiv
exit
printf
_stricmp
_onexit
abort
memmove
fopen
fseek
_initterm
strlen
_exit
__set_app_type
kernel32
CreateProcessA
GlobalAlloc
GetProcAddress
ExpandEnvironmentStringsA
GetCPInfo
LoadLibraryA
GlobalHandle
GetModuleHandleW
GetFileAttributesA
RtlUnwind
GetLocaleInfoW
DisableThreadLibraryCalls
FormatMessageA
MultiByteToWideChar
comctl32
ImageList_DragLeave
CreateToolbarEx
ImageList_SetDragCursorImage
PropertySheetA
InitializeFlatSB
ImageList_DragShowNolock
ImageList_DrawEx
ImageList_BeginDrag
ole32
StringFromIID
OleIsCurrentClipboard
StringFromCLSID
OleSetMenuDescriptor
OleUninitialize
CoGetMalloc
CoTaskMemFree
IsEqualGUID
CoRegisterMessageFilter
OleRun
shell32
SHGetSpecialFolderPathA
SHGetDiskFreeSpaceExW
SHCreateDirectoryExA
SHGetPathFromIDListW
SHFileOperationA
SHGetFolderLocation
ShellExecuteW
SHBrowseForFolder
SHCreateDirectoryExW
SHBindToParent
SHGetFolderPathW
ExtractIconExA
oleaut32
SafeArrayCreate
SysStringLen
VariantCopyInd
SafeArrayPtrOfIndex
SysAllocStringLen
SafeArrayPutElement
SafeArrayGetUBound
advapi32
RegOpenKeyW
GetUserNameA
CryptDestroyHash
EqualSid
RegEnumKeyA
RegFlushKey
RegEnumValueW
LookupPrivilegeValueA
DeregisterEventSource
GetLengthSid
RevertToSelf
ControlService
RegOpenKeyExW
RegCloseKey
RegCreateKeyExW
DeleteService
gdi32
Polygon
EnumMetaFile
OffsetRgn
SetWindowOrgEx
EnumEnhMetaFile
GetBrushOrgEx
ExtCreatePen
GetBitmapBits
CreateFontA
GetMapMode
user32
OffsetRect
RemovePropA
GetMenuStringA
GetFocus
InsertMenuA
GetCapture
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 43KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 59KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE