Static task
static1
Behavioral task
behavioral1
Sample
07243ce69868b9ca72cfdb8ebc2e70643b3d838c244b4fc3ee6cdaac3234272d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
07243ce69868b9ca72cfdb8ebc2e70643b3d838c244b4fc3ee6cdaac3234272d.exe
Resource
win10v2004-20220812-en
General
-
Target
07243ce69868b9ca72cfdb8ebc2e70643b3d838c244b4fc3ee6cdaac3234272d
-
Size
58KB
-
MD5
78e18250886a1ff9ae7ac8ba15cf7d60
-
SHA1
1da646e7fda9dcd9f080f0ed0bbc2407fcf121ea
-
SHA256
07243ce69868b9ca72cfdb8ebc2e70643b3d838c244b4fc3ee6cdaac3234272d
-
SHA512
d241f1fe233856324ceb6af1fd4336423c7269aebacc174550683dc6043e20961a66919dad87d9d96c7471d716ac81c08edfc5aa036c2b9a93a4c18b27496010
-
SSDEEP
768:0ouL1o/4jVHIK8+h+T7X5/0h7PVHyI5PeIw7M56YR+KnI7Q1L5hMqWLAaoWFhx/P:Zg1o/IH0+wnX1akIEI953Rt1nvWp
Malware Config
Signatures
Files
-
07243ce69868b9ca72cfdb8ebc2e70643b3d838c244b4fc3ee6cdaac3234272d.exe windows x86
2fb5c8d61922dd437c088d4799d715d2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_vsnwprintf
memmove
advapi32
RegEnumKeyW
RegQueryInfoKeyW
RegDeleteKeyW
RegQueryValueExW
RegEnumValueW
RegOpenKeyExW
RegQueryValueW
RegCloseKey
RegEnumKeyExW
RegOpenKeyW
RegSetValueExW
RegCreateKeyW
RegSetValueW
kernel32
GlobalAlloc
ReadFile
SetFilePointer
LocalFree
FreeResource
LockResource
LoadResource
FindResourceW
FreeLibrary
EnumResourceNamesW
LoadLibraryExW
SetErrorMode
GetSystemTimeAsFileTime
GetPrivateProfileStringW
GlobalSize
GlobalReAlloc
GlobalUnlock
MultiByteToWideChar
CloseHandle
WriteFile
CreateFileW
DeleteFileW
GetTempFileNameW
GetEnvironmentVariableW
lstrlenA
RemoveDirectoryW
SetFileAttributesW
GetLastError
GlobalLock
MulDiv
WritePrivateProfileStringW
GetModuleFileNameW
WinExec
LoadLibraryW
GetThreadLocale
ExitProcess
GetStartupInfoW
GetCommandLineW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
lstrcmpW
GetPrivateProfileSectionW
LocalAlloc
GlobalFree
lstrcmpiW
lstrlenW
SearchPathW
GetWindowsDirectoryW
FindClose
FindFirstFileW
SetLastError
GetProcAddress
GetModuleHandleW
lstrcpynW
ExpandEnvironmentStringsW
MoveFileW
gdi32
GetTextExtentPointW
GetTextExtentExPointW
GetDeviceCaps
user32
SetForegroundWindow
LoadStringW
LookupIconIdFromDirectory
CopyRect
LoadCursorW
SetCursor
SystemParametersInfoW
GetLastActivePopup
MessageBoxW
GetDlgItem
GetDC
GetClientRect
ReleaseDC
GetSystemMetrics
EnableMenuItem
PeekMessageW
DispatchMessageW
SendDlgItemMessageW
DestroyWindow
CreateDialogParamW
SetDlgItemTextW
GetSystemMenu
CharNextW
comctl32
ord17
ord358
ord235
ord324
ord236
ord73
ord323
ord326
ord321
ord320
ord365
ord332
ord328
ord334
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
shell32
ord195
FindExecutableW
ord32
ord31
SHChangeNotify
ord34
ord57
ord39
ord175
ord49
ord165
ord119
ord155
SHGetSpecialFolderLocation
ord37
ord33
ord196
SHGetPathFromIDListW
ord96
ord25
ord157
ord29
ShellExecuteExW
ord128
ord63
ord23
ord58
ord52
ord56
ord51
ord94
ord45
ord36
ord35
ord164
ord79
SHAddToRecentDocs
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 632B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE