Static task
static1
Behavioral task
behavioral1
Sample
7e276851933f19603488608ea40c773eea9fb827292f615c3cd67ad80d80af47.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7e276851933f19603488608ea40c773eea9fb827292f615c3cd67ad80d80af47.exe
Resource
win10v2004-20220812-en
General
-
Target
7e276851933f19603488608ea40c773eea9fb827292f615c3cd67ad80d80af47
-
Size
100KB
-
MD5
0470b3f74d4743bb94f914ee2a1b6c40
-
SHA1
d8c3029f4eac60752887a671c38209e8b292fbcd
-
SHA256
7e276851933f19603488608ea40c773eea9fb827292f615c3cd67ad80d80af47
-
SHA512
79d42095d1bec3ca18183164a36e158970e3573835e784a12a2694a633a1605cd8fb74293c36d5aa02f25047f0bd4fa9d1f7e61150db34d61e1dca15ae009264
-
SSDEEP
1536:xdvy3tA9CS+Czcc/OlqMH7kQrPtcwUMNC7ccuUrCKOioQ7rGk:7y3toCHpbk8mwUMNC9uU0Q3Gk
Malware Config
Signatures
Files
-
7e276851933f19603488608ea40c773eea9fb827292f615c3cd67ad80d80af47.exe windows x86
ec808d5fd1b1ec715ce7eb5b2f4152ad
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr71
wcsrchr
wcstoul
wcscat
strncmp
swprintf
_vsnwprintf
realloc
memmove
strlen
strchr
wcsncmp
vswprintf
_controlfp
_onexit
__dllonexit
__security_error_handler
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__wgetmainargs
_amsg_exit
__p___winitenv
exit
_cexit
_XcptFilter
_exit
_c_exit
memset
__CxxFrameHandler
malloc
free
wcslen
wcscpy
_wcsicmp
printf
wprintf
memcmp
kernel32
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCurrentProcess
GetProcessAffinityMask
VirtualQuery
VirtualAlloc
OutputDebugStringW
OutputDebugStringA
GetTickCount
FindFirstFileA
FindClose
GetDateFormatW
GetDateFormatA
RemoveDirectoryW
RemoveDirectoryA
CreateDirectoryW
CreateDirectoryA
CreateSemaphoreW
QueryPerformanceCounter
ExitProcess
GetModuleHandleA
GetLastError
ReadFile
lstrlenA
MultiByteToWideChar
lstrlenW
CloseHandle
RaiseException
GetProcAddress
LocalFree
LocalAlloc
FatalAppExitA
FatalAppExitW
CreateMutexA
CreateMutexW
CreateEventA
CreateEventW
OpenEventA
OpenEventW
GetModuleHandleW
GetFileAttributesA
GetFileAttributesW
SetFileAttributesA
SetFileAttributesW
GetEnvironmentVariableA
GetEnvironmentVariableW
SetEnvironmentVariableA
SetEnvironmentVariableW
CreateFileMappingA
CreateFileMappingW
OpenFileMappingA
OpenFileMappingW
CreateProcessA
CreateProcessW
lstrcatW
lstrcpyW
FreeLibrary
OpenProcess
GetSystemInfo
WriteFile
FindResourceW
FindFirstFileW
GetSystemDirectoryA
GetSystemDirectoryW
GetWindowsDirectoryA
GetWindowsDirectoryW
FindNextFileA
FindNextFileW
GetCommandLineW
FreeEnvironmentStringsA
GetEnvironmentStrings
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetModuleFileNameW
GetVersionExA
GetVersionExW
GetComputerNameA
GetComputerNameW
WideCharToMultiByte
GetCPInfo
EnumResourceLanguagesW
GetCurrentDirectoryA
GetCurrentDirectoryW
GetTempPathA
GetTempPathW
GetFullPathNameA
GetFullPathNameW
GetTempFileNameA
GetTempFileNameW
SetLastError
FindResourceA
CreateSemaphoreA
GetDiskFreeSpaceExA
GetDiskFreeSpaceExW
FindFirstChangeNotificationA
FindFirstChangeNotificationW
LoadLibraryExA
LoadLibraryExW
FormatMessageA
FormatMessageW
SearchPathA
SearchPathW
GetPrivateProfileIntA
GetPrivateProfileIntW
GetPrivateProfileStringA
GetPrivateProfileStringW
WritePrivateProfileStringA
WritePrivateProfileStringW
GetFileType
CreateFileA
CreateFileW
CopyFileA
CopyFileW
MoveFileA
MoveFileW
DeleteFileA
MoveFileExW
DeleteFileW
GetDriveTypeA
GetDriveTypeW
GetVolumeInformationA
GetVolumeInformationW
GetStdHandle
shlwapi
PathCombineW
mscoree
LoadLibraryShim
advapi32
RegisterEventSourceA
ReportEventW
DeregisterEventSource
LookupAccountNameW
LookupAccountNameA
LookupAccountSidW
LookupAccountSidA
CryptAcquireContextA
RegQueryValueExW
RegReplaceKeyW
RegReplaceKeyA
RegRestoreKeyW
RegRestoreKeyA
RegUnLoadKeyW
RegUnLoadKeyA
RegLoadKeyW
RegLoadKeyA
RegDeleteValueW
RegDeleteValueA
RegQueryValueW
RegQueryValueA
RegCreateKeyExW
RegCreateKeyExA
RegSetValueExW
RegSetValueExA
RegDeleteKeyW
RegDeleteKeyA
SetFileSecurityW
SetFileSecurityA
LookupPrivilegeValueW
LookupPrivilegeValueA
RegOpenKeyExW
RegOpenKeyExA
RegCloseKey
RegEnumValueW
RegEnumValueA
GetUserNameW
GetUserNameA
RegQueryValueExA
RegQueryInfoKeyW
RegQueryInfoKeyA
RegEnumKeyExW
RegEnumKeyExA
user32
CharPrevW
SendMessageA
SetWindowLongW
GetWindowLongW
CallWindowProcA
SystemParametersInfoA
GetWindowTextA
GetWindowTextW
PeekMessageA
PeekMessageW
DispatchMessageA
DispatchMessageW
PostMessageA
PostMessageW
GetClassNameA
GetClassNameW
DefWindowProcA
DefWindowProcW
TranslateAcceleratorA
TranslateAcceleratorW
GetWindowLongA
SetWindowLongA
IsDialogMessageA
IsDialogMessageW
GetMessageA
GetMessageW
LoadStringA
LoadStringW
GetUserObjectInformationW
GetProcessWindowStation
SendMessageW
LoadMenuA
LoadMenuW
GetClassInfoA
GetClassInfoW
RegisterClassA
RegisterClassW
CreateWindowExA
CreateWindowExW
LoadAcceleratorsA
LoadAcceleratorsW
LoadImageA
LoadImageW
MessageBoxA
MessageBoxW
CreateDialogParamA
CreateDialogParamW
DialogBoxParamA
DialogBoxParamW
LoadIconA
LoadIconW
LoadCursorA
LoadCursorW
SetWindowTextA
SetWindowTextW
SetDlgItemTextA
SetDlgItemTextW
GetDlgItem
SendDlgItemMessageW
Sections
.text Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE