Static task
static1
Behavioral task
behavioral1
Sample
7b2bd41e42537dbeb2a868ab003769a3bba35cd31da4a2687e21b58007e8e7d2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7b2bd41e42537dbeb2a868ab003769a3bba35cd31da4a2687e21b58007e8e7d2.exe
Resource
win10v2004-20220812-en
General
-
Target
7b2bd41e42537dbeb2a868ab003769a3bba35cd31da4a2687e21b58007e8e7d2
-
Size
804KB
-
MD5
6dcf15691b71fa90ea68fef50a261cc0
-
SHA1
599e04c8ebd71b435deb0e2b9d9e828c7f0ebbfc
-
SHA256
7b2bd41e42537dbeb2a868ab003769a3bba35cd31da4a2687e21b58007e8e7d2
-
SHA512
bbb85ca38bbc7d25b29d84e026e1c2f972d946a5cca40dec7ae525ed898e5d3979d76cfee34e740e48bd386e372a9080568be9fe543fd9d010ac53e62852dd5a
-
SSDEEP
12288:eSvvbXGgIuGN1hWkyeqJeQdIu1wOcRmxKpAWiLXqs76ve7I+L:eSJo1hWqoIuKOUmgpAWkR76v9
Malware Config
Signatures
Files
-
7b2bd41e42537dbeb2a868ab003769a3bba35cd31da4a2687e21b58007e8e7d2.exe windows x86
cd80e675773057144501786e0ffee1d5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
SetLastError
GetVersion
VirtualQuery
FlushInstructionCache
LoadLibraryA
GetSystemDirectoryA
GetWindowsDirectoryA
GetModuleFileNameA
GetModuleHandleA
FreeLibrary
InterlockedExchange
CompareStringA
InitializeCriticalSection
GetPrivateProfileIntA
ResumeThread
FindFirstFileA
FindNextFileA
GetPrivateProfileStringA
GetTickCount
GetLocalTime
WritePrivateProfileStringA
EnterCriticalSection
LeaveCriticalSection
ExitThread
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalReAlloc
GlobalFree
GetLastError
CloseHandle
GetCommandLineW
SuspendThread
Sleep
SetEnvironmentVariableA
GetOEMCP
GetACP
CreateFileA
IsBadCodePtr
IsBadReadPtr
LCMapStringA
GetStringTypeA
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetStartupInfoA
SetHandleCount
GetCommandLineA
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetFileType
SetStdHandle
HeapSize
TerminateProcess
SetConsoleCtrlHandler
GetSystemTime
GetTimeZoneInformation
HeapReAlloc
CreateThread
RaiseException
HeapFree
HeapAlloc
RtlUnwind
ExitProcess
SetErrorMode
GetFileTime
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentProcess
DuplicateHandle
FindClose
GetProcessVersion
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
TlsFree
GlobalHandle
TlsAlloc
DeleteCriticalSection
LocalAlloc
FileTimeToLocalFileTime
FileTimeToSystemTime
GetThreadLocale
MulDiv
LoadResource
LockResource
LocalFree
GetCurrentThreadId
FlushConsoleInputBuffer
GetStdHandle
GetCurrentProcessId
GlobalMemoryStatus
QueryPerformanceCounter
GetVersionExA
GetCurrentThread
GlobalDeleteAtom
InterlockedIncrement
InterlockedDecrement
lstrlenA
WaitForSingleObject
SetEvent
SetThreadPriority
advapi32
RegCloseKey
user32
BringWindowToTop
SetCursor
ClientToScreen
ScreenToClient
GetAsyncKeyState
SetWindowRgn
GetDesktopWindow
GetWindowRect
GetKeyState
GetDC
ReleaseDC
SetRect
IsIconic
GetSystemMetrics
GetClientRect
PostQuitMessage
IsWindowEnabled
GetLastActivePopup
GetParent
GetCursorPos
IsWindowVisible
ValidateRect
CallNextHookEx
DrawIcon
TranslateMessage
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
GetMenuState
GetMenuCheckMarkDimensions
GetWindowPlacement
OffsetRect
SetWindowPos
GetWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
UnhookWindowsHookEx
DestroyWindow
GetDlgCtrlID
GetDlgItem
GetMenuItemID
GetSubMenu
GetMenuItemCount
GetMenu
GetCapture
IsChild
GetTopWindow
CopyRect
AdjustWindowRectEx
SetFocus
IsWindow
SetActiveWindow
GetSysColor
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
SetWindowContextHelpId
MapDialogRect
EndDialog
MoveWindow
DestroyMenu
GetWindowDC
BeginPaint
EndPaint
PtInRect
GetSysColorBrush
GetNextDlgGroupItem
MessageBeep
SetForegroundWindow
ShowWindow
GetActiveWindow
gdi32
GetClipBox
SetTextColor
SetBkColor
SaveDC
RestoreDC
GetStockObject
SetBkMode
GetDeviceCaps
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
MoveToEx
LineTo
SetMapMode
SetViewportOrgEx
GetCurrentObject
GetMapMode
LPtoDP
DPtoLP
GetBkColor
Escape
RectVisible
PtVisible
CreateSolidBrush
DeleteDC
BitBlt
SelectObject
CreateDIBSection
CreateCompatibleDC
CreateBitmap
GetTextColor
Rectangle
DeleteObject
CombineRgn
ExtCreateRegion
GetPixel
CreatePen
GetWindowExtEx
GetViewportExtEx
d3d8
Direct3DCreate8
packdll
UseLocalUpdatePack
RemoveFileFromPack
GetPackVersion
PackInitialize
PackFinalize
NeedCleanUpPackFile
GetFileFromPack
ReleasePackBuf
AddFileToPack
DecompressFile
FillPackVersion
GetLocalUpdateFile
CalcCompressFile
CleanUpPackFile
SetPackVersion
IsFileInPack
sysinfo
??1SysInfo@@UAE@XZ
??0SysInfo@@QAE@XZ
comctl32
ord17
ole32
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
OleFlushClipboard
OleIsCurrentClipboard
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
olepro32
ord253
oleaut32
VariantClear
SysFreeString
SysAllocStringLen
VariantCopy
SysAllocString
VariantChangeType
VariantTimeToSystemTime
SysStringLen
wininet
InternetGetLastResponseInfoW
HttpQueryInfoW
HttpSendRequestW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetConnectW
InternetQueryDataAvailable
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetSetOptionExW
InternetCrackUrlW
InternetCanonicalizeUrlW
InternetOpenW
InternetCloseHandle
winspool.drv
ClosePrinter
Sections
.text Size: 388KB - Virtual size: 387KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 60KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tc Size: 248KB - Virtual size: 248KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE