Static task
static1
Behavioral task
behavioral1
Sample
7819c582e34862cc08c61f434fe8a5924feb2a3e44cf79da1dfdb3d4cb85f814.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7819c582e34862cc08c61f434fe8a5924feb2a3e44cf79da1dfdb3d4cb85f814.exe
Resource
win10v2004-20220901-en
General
-
Target
7819c582e34862cc08c61f434fe8a5924feb2a3e44cf79da1dfdb3d4cb85f814
-
Size
799KB
-
MD5
5548b052fb99aad4c48836bc1220a04a
-
SHA1
5a1c8b7bc52b1cb1110ba5e6f149f1b56edb093c
-
SHA256
7819c582e34862cc08c61f434fe8a5924feb2a3e44cf79da1dfdb3d4cb85f814
-
SHA512
d2b93dbd00a8498eca73447e10ea1d9d79f7793dfeff0ccfb2e3233ab187db218c0d7a74342fb059e67992dc6b153ac4b77d6e80c9f454767b55f841c9a07781
-
SSDEEP
24576:xBJNDvLVYnWLcG70CwqDvQrB+0IBc/eeL7n4fbbAsavn:TvKnWLp7RwIvQd2c/egsQ
Malware Config
Signatures
Files
-
7819c582e34862cc08c61f434fe8a5924feb2a3e44cf79da1dfdb3d4cb85f814.exe windows x86
952755745f29b5221ee89bb85286ac71
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
DeleteDC
SetTextColor
SetBkColor
CreateSolidBrush
kernel32
ExitProcess
VirtualAlloc
GetOEMCP
FindResourceA
Sleep
VirtualFree
HeapCreate
CreateProcessA
SizeofResource
InterlockedExchange
GetModuleHandleW
GetACP
CloseHandle
ReadFile
SetFilePointer
TlsFree
MapViewOfFile
CompareStringA
RaiseException
InterlockedCompareExchange
HeapSize
WideCharToMultiByte
GetCommandLineW
LockResource
GetEnvironmentStrings
GlobalAlloc
GetEnvironmentStringsW
LCMapStringA
GetConsoleCP
GlobalFree
lstrlenA
LCMapStringW
InterlockedIncrement
CreateFileA
TlsSetValue
GetFileType
CreateFileW
GetTimeZoneInformation
FindNextFileA
CreateFileMappingA
ResetEvent
lstrcpyA
FindFirstFileA
CompareStringW
GetProcessHeap
GetSystemInfo
GetProcAddress
DeleteFileW
SetErrorMode
DeleteFileA
GetFileSize
GetStartupInfoA
LoadLibraryA
GetVersionExA
TlsAlloc
QueryPerformanceCounter
FreeLibrary
lstrcmpiA
EnterCriticalSection
HeapFree
LeaveCriticalSection
GetLocaleInfoA
SetEndOfFile
CreateEventW
VirtualQuery
TerminateProcess
MulDiv
GetCurrentProcessId
CreateThread
GetLocalTime
MultiByteToWideChar
TlsGetValue
UnhandledExceptionFilter
LoadLibraryExA
lstrcmpiW
GetModuleFileNameA
FlushFileBuffers
HeapAlloc
IsDebuggerPresent
GetModuleFileNameW
SetLastError
InterlockedDecrement
FindClose
LoadResource
InitializeCriticalSection
GetExitCodeProcess
FormatMessageW
LocalFree
SetEvent
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
WriteFile
GetCPInfo
GetTempPathA
GetConsoleMode
GetCurrentProcess
DeleteCriticalSection
FreeEnvironmentStringsA
HeapDestroy
WaitForSingleObject
GetFileAttributesA
FileTimeToSystemTime
GetStdHandle
GetCurrentThreadId
GetLastError
GetVersion
GetModuleHandleA
GetCurrentThread
GetTickCount
GetCommandLineA
SetUnhandledExceptionFilter
user32
ScreenToClient
GetDlgItem
SetWindowTextA
SetWindowLongA
PostMessageA
GetWindowRect
GetSystemMetrics
DefWindowProcA
BeginPaint
SetFocus
DispatchMessageA
SetTimer
GetSubMenu
RegisterClassA
EnableMenuItem
IsWindowEnabled
TranslateMessage
EnableWindow
ShowWindow
SendMessageA
ReleaseDC
PeekMessageA
EndPaint
SetWindowPos
PostQuitMessage
EndDialog
MessageBoxA
GetSysColor
SystemParametersInfoA
InvalidateRect
CallWindowProcA
SetCursor
GetDesktopWindow
advapi32
RegDeleteValueA
RegSetValueExW
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegOpenKeyExW
RegSetValueExA
Sections
.text Size: 766KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ