Static task
static1
Behavioral task
behavioral1
Sample
7d47bdf80553078a8ef8b4840670f1630dbbc64373bac1b2b07b80555b794523.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7d47bdf80553078a8ef8b4840670f1630dbbc64373bac1b2b07b80555b794523.exe
Resource
win10v2004-20220812-en
General
-
Target
7d47bdf80553078a8ef8b4840670f1630dbbc64373bac1b2b07b80555b794523
-
Size
160KB
-
MD5
060aab6e038447853f97cc09fda0283a
-
SHA1
5085c75d4504b9af1d9a01d2b761b814be1ed1bd
-
SHA256
7d47bdf80553078a8ef8b4840670f1630dbbc64373bac1b2b07b80555b794523
-
SHA512
e70c8bb105b8b4f7ddf379687cd4284e15866265eb1f6fa85b08a4af69ef050731d42f0bc418246ce24cf904bb6357fd327093b31bc46ac22c13b3c3e3cfc8a7
-
SSDEEP
3072:Aox46Vdp9V4LZZAyARl0DJyIu4liPc96uOOvYip6f:Aom6vpr4LZZlA70G4cG6uJv1p0
Malware Config
Signatures
Files
-
7d47bdf80553078a8ef8b4840670f1630dbbc64373bac1b2b07b80555b794523.exe windows x86
f477390aaf332ebe38831742e35e40e9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_vsnprintf
_beginthread
??2@YAPAXI@Z
_endthread
sprintf
_except_handler3
wcsrchr
_itow
_ftol
free
malloc
??3@YAXPAX@Z
advapi32
RegOpenKeyExA
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegCreateKeyExW
RegCreateKeyExA
RegOpenKeyExW
RegCreateKeyA
RegCloseKey
RegSetValueA
RegOpenKeyA
RegQueryValueA
RegDeleteKeyA
ImpersonateLoggedOnUser
RegisterEventSourceW
GetUserNameW
LookupAccountNameW
ReportEventW
DeregisterEventSource
IsTextUnicode
RegSetValueExW
kernel32
GetStartupInfoA
WideCharToMultiByte
MultiByteToWideChar
GetModuleFileNameA
GetCommandLineA
lstrlenW
GetCommandLineW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetPrivateProfileIntA
GetPrivateProfileStringW
GetPrivateProfileStringA
GetFullPathNameW
GetFullPathNameA
GetModuleHandleA
lstrlenA
lstrcpyA
HeapReAlloc
HeapAlloc
GetProcessHeap
HeapFree
GetStdHandle
GetFileType
FreeLibrary
GetSystemDirectoryA
GetTempPathA
GetTempFileNameA
CreateFileA
WriteFile
FlushFileBuffers
GetUserDefaultLCID
GetCPInfo
GetFileAttributesW
FindFirstFileW
GetFileAttributesA
FindFirstFileA
FindClose
GetLastError
ExitProcess
GetACP
CreateEventA
CreateThread
CloseHandle
SetEvent
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InterlockedIncrement
GetCurrentThreadId
GetVersionExA
GetPrivateProfileIntW
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
CreateFileW
GetLocaleInfoA
GetModuleFileNameW
LoadLibraryA
LocalFree
FormatMessageA
LocalAlloc
FormatMessageW
GetProcAddress
user32
SetWindowLongA
GetWindowLongA
CreateWindowExA
RegisterClassA
GetClassInfoA
CharNextA
LoadStringA
LoadStringW
SetTimer
GetMessageA
DispatchMessageA
GetActiveWindow
MessageBoxW
PostThreadMessageA
DefWindowProcA
PostQuitMessage
KillTimer
EnumThreadWindows
IsWindowVisible
PostMessageA
wsprintfA
wsprintfW
GetParent
TranslateMessage
PeekMessageA
MsgWaitForMultipleObjects
SendMessageA
oleaut32
VariantCopy
VariantClear
CreateErrorInfo
SetErrorInfo
SysAllocStringByteLen
SysFreeString
LoadRegTypeLi
SysAllocStringLen
SysStringLen
LoadTypeLibEx
UnRegisterTypeLi
SafeArrayGetLBound
SafeArrayCopy
VariantInit
LoadTypeLi
VariantChangeType
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayDestroy
SafeArrayPutElement
SafeArrayCreate
SysAllocString
ole32
CoGetMalloc
StringFromCLSID
CoRegisterClassObject
CoRevokeClassObject
CoCreateInstance
CoInitialize
CoUninitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CreateBindCtx
CreateFileMoniker
CoInitializeSecurity
CoRegisterMessageFilter
CLSIDFromString
CLSIDFromProgID
MkParseDisplayName
CoGetClassObject
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
imm32
ImmGetDefaultIMEWnd
Sections
.text Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE