Static task
static1
Behavioral task
behavioral1
Sample
29bc98629bbf90c7bb3e76fc040b69588c053460b13600932007625e015c6b47.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
29bc98629bbf90c7bb3e76fc040b69588c053460b13600932007625e015c6b47.exe
Resource
win10v2004-20220812-en
General
-
Target
29bc98629bbf90c7bb3e76fc040b69588c053460b13600932007625e015c6b47
-
Size
222KB
-
MD5
6e5a57a89e20d43418faca9f75057107
-
SHA1
613c229ddd061a95d5e00ba1f1c819f25514909b
-
SHA256
29bc98629bbf90c7bb3e76fc040b69588c053460b13600932007625e015c6b47
-
SHA512
28eae29d41e4be1c742b0065939366b3406632e44eecb7f8e21109e8f8e516702e81ff32531c3ab2ab4ea7c42586c2efa83520c2aeb25bb94c6576080f9b5973
-
SSDEEP
6144:Gt+Ua88Igq6InInRe8OKjdIhaAYshFOB/CK5xB1D3EXK:GtT8IgqlOen7QIaYW
Malware Config
Signatures
Files
-
29bc98629bbf90c7bb3e76fc040b69588c053460b13600932007625e015c6b47.exe windows x86
7938694cf2f294ab88e408de122d9ea2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReplaceFileA
CopyFileExA
IsBadWritePtr
FileTimeToLocalFileTime
GlobalDeleteAtom
GetShortPathNameW
ReadDirectoryChangesW
LoadLibraryA
LocalFree
CreateEventW
GetUserDefaultLangID
lstrcpynA
QueryPerformanceFrequency
GetNumberFormatW
SleepEx
lstrcmp
GetProcessHeaps
FatalAppExitA
CreateNamedPipeW
GetAtomNameA
GetNamedPipeInfo
FileTimeToSystemTime
GetProcAddress
GetLongPathNameA
lstrcmpi
BeginUpdateResourceW
GetTimeFormatW
GetEnvironmentVariableW
GetEnvironmentStringsA
GetSystemTime
lstrcmpiA
GetCurrentDirectoryW
GetExpandedNameW
OpenMutexW
GetVersion
LocalAlloc
GetWindowsDirectoryA
SetCalendarInfoW
SetCurrentDirectoryA
SetThreadPriority
lstrcatA
CreateDirectoryA
BeginUpdateResourceA
FreeResource
lstrcat
GetPriorityClass
lstrcpyW
GetDiskFreeSpaceW
SearchPathW
OpenWaitableTimerW
EnumTimeFormatsW
user32
AnimateWindow
LoadMenuW
LoadCursorA
SetWindowPos
GetParent
MessageBoxIndirectA
OffsetRect
CreatePopupMenu
MonitorFromPoint
DefDlgProcW
GetWindowRgn
InsertMenuItemA
SetForegroundWindow
GetMenuStringA
GetForegroundWindow
GetClassInfoW
gdi32
FillRgn
SwapBuffers
GetNearestColor
SetGraphicsMode
GetTextCharset
PolyPolyline
CreateDCA
GetTextExtentPointW
GetDCOrgEx
FlattenPath
SetBitmapBits
GetCharWidthI
DeleteColorSpace
GetROP2
GetEnhMetaFileHeader
CreateSolidBrush
SaveDC
FixBrushOrgEx
advapi32
RegOpenKeyA
RegSaveKeyA
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCloseKey
RegDeleteKeyA
shlwapi
StrCatChainW
PathIsNetworkPathA
AssocQueryKeyW
PathRelativePathToA
StrRetToStrW
PathMatchSpecW
StrRChrIW
StrToIntW
SHRegQueryInfoUSKeyW
inetcomm
MimeOleDecodeHeader
MimeOleGetPropW
HrSaveAttachmentAs
EssMLHistoryDecodeEx
MimeOleSetDefaultCharset
MimeEditViewSource
crypt32
CertNameToStrW
CertUnregisterPhysicalStore
CertSetCertificateContextPropertiesFromCTLEntry
CryptSIPLoad
Sections
.Ywhhbm Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mefhuX Size: 1024B - Virtual size: 469KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ENyL Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nV Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.zAePyF Size: 3KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.HHsL Size: 3KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.BhU Size: 4KB - Virtual size: 456KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.XtIP Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 300KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ