Static task
static1
Behavioral task
behavioral1
Sample
7d5d13a79b3ac5739ab93c60f3e8fea38d648789a2d8989256cf5d7510da7e8e.exe
Resource
win7-20220812-en
General
-
Target
7d5d13a79b3ac5739ab93c60f3e8fea38d648789a2d8989256cf5d7510da7e8e
-
Size
684KB
-
MD5
60ad3902e80c7851177c537a40a0fad0
-
SHA1
d002549872779f94e94621512b587114a898ac79
-
SHA256
7d5d13a79b3ac5739ab93c60f3e8fea38d648789a2d8989256cf5d7510da7e8e
-
SHA512
e7cf9939bd0cd32360195a93962f6928f25ce80d118450302e432efa4274cdf72315ee25a1b24a94f5b2cad661e4ce2ed4b41b979fbd6c918026a0898cf0f7dc
-
SSDEEP
3072:PDZw378b8lhCck5oY4bA4+kQNmqS9qPZSIwuFnR9LI1kV7PSClu/aQd:PD6L8b4k534bdWNmrYZSkr9IOWiQd
Malware Config
Signatures
Files
-
7d5d13a79b3ac5739ab93c60f3e8fea38d648789a2d8989256cf5d7510da7e8e.exe windows x86
45fbc451487e3aae208c7caf42326e55
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord4467
ord5012
ord5472
ord3403
ord2879
ord2878
ord4151
ord6055
ord4077
ord1776
ord4407
ord5237
ord2385
ord5163
ord6374
ord4353
ord5282
ord2649
ord1665
ord3798
ord4837
ord4436
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord2446
ord2124
ord5277
ord3262
ord3081
ord4627
ord4427
ord674
ord3521
ord366
ord2884
ord4457
ord5252
ord1233
ord1146
ord4413
ord6401
ord3870
ord6402
ord6197
ord3797
ord3138
ord6195
ord975
ord3520
ord2379
ord4590
ord5054
ord3571
ord4078
ord5290
ord4441
ord5261
ord3742
ord567
ord3626
ord3663
ord818
ord2414
ord4275
ord2152
ord1641
ord1768
ord755
ord640
ord5785
ord1640
ord323
ord470
ord4234
ord2302
ord6307
ord3092
ord4284
ord6199
ord521
ord4710
ord2645
ord3721
ord3402
ord3698
ord5265
ord4376
ord4853
ord4998
ord2514
ord6052
ord1775
ord5241
ord5280
ord4425
ord3597
ord765
ord795
ord641
ord1651
ord2867
ord324
ord2463
ord3584
ord543
ord803
ord1105
ord4612
ord4610
ord4274
ord1946
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord561
ord815
ord1200
ord826
ord617
ord5301
ord6354
ord5214
ord296
ord986
ord520
ord6117
ord2621
ord1134
ord824
ord1193
ord4303
ord3350
ord1151
ord5500
ord2390
ord5100
ord6394
ord2841
ord2448
ord2044
ord2107
ord5440
ord6383
ord1825
ord4238
ord4696
ord3058
ord3065
ord6336
ord2510
ord2542
ord5243
ord5740
ord1746
ord5577
ord3172
ord5653
ord4420
ord4953
ord4858
ord2399
ord4387
ord3454
ord3198
ord6080
ord6175
ord4623
ord4426
ord338
ord652
ord4823
ord1168
ord6041
ord924
ord6597
ord6800
ord6650
ord6591
ord6807
ord6857
ord6823
ord6855
ord6832
ord6859
ord6867
ord6847
ord6839
ord6846
ord6858
ord6812
ord6845
ord6856
ord6835
ord4589
ord4588
ord4899
ord4370
ord4892
ord5076
ord4340
ord4347
ord4889
ord4531
ord4545
ord4543
ord4526
ord4529
ord4524
ord4963
ord4960
ord4108
ord6054
ord5240
ord5281
ord3748
ord1725
ord6691
ord4432
ord6514
ord6478
ord5260
ord3005
ord2135
ord6805
ord4720
ord6699
ord1601
ord5981
ord6814
ord6816
ord6808
ord6815
ord4046
ord2145
ord2144
ord6225
ord5231
ord5247
ord2132
ord4601
ord5435
ord1683
ord1673
ord2628
ord5980
ord2641
ord4122
ord6214
ord6196
ord4298
ord5948
ord3088
ord3875
ord3872
ord3871
ord6198
ord4286
ord4283
ord3137
ord3796
ord5719
ord6092
ord3524
ord4032
ord6095
ord4035
ord2549
ord2433
ord3271
ord3353
ord3579
ord426
ord726
ord2727
ord6467
ord2730
ord2729
ord3237
ord539
ord5103
ord2725
ord3059
ord2976
ord2985
ord3136
ord4465
ord3259
ord3147
ord2982
ord1799
ord825
ord823
ord1842
ord2723
ord4242
ord6215
ord1147
ord4160
ord535
ord1175
ord2818
ord665
ord354
ord3790
ord446
ord537
ord743
ord4226
ord4003
ord2486
ord290
ord4622
ord1223
ord858
ord540
ord860
ord614
ord2623
ord1206
ord4080
ord800
ord4424
ord3831
ord3079
ord3825
ord5450
ord3830
ord5834
ord1205
ord3456
ord1576
msvcrt
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
_stat
_vsnprintf
_setmbcp
_CxxThrowException
_ftol
__p___argc
_purecall
memset
memcpy
memcmp
__p___argv
__CxxFrameHandler
_strdup
free
_mbsicmp
_splitpath
_controlfp
kernel32
GetModuleHandleA
FormatMessageA
LocalAlloc
MultiByteToWideChar
InterlockedIncrement
SetLastError
InterlockedDecrement
GetTempFileNameA
OpenFileMappingA
GetTempPathA
UnmapViewOfFile
CloseHandle
MapViewOfFile
OpenFile
_llseek
lstrcatA
_lwrite
_lclose
lstrlenA
FreeLibrary
LoadLibraryA
lstrcpyA
InitializeCriticalSection
DeleteCriticalSection
SetEvent
LeaveCriticalSection
ResumeThread
EnterCriticalSection
GetCurrentProcess
CreateEventA
DuplicateHandle
lstrcmpiA
GetModuleFileNameA
WaitForSingleObject
GetStartupInfoA
lstrlenW
GetProcAddress
GetLastError
LocalFree
user32
OffsetRect
IntersectRect
SystemParametersInfoA
MsgWaitForMultipleObjects
LoadIconA
GetWindowRect
GetSystemMetrics
SetRectEmpty
wsprintfA
IsWindowVisible
PostMessageA
TranslateMessage
DispatchMessageA
AdjustWindowRectEx
LoadImageA
LoadCursorA
SendMessageA
PeekMessageA
CopyRect
SetRect
GetClientRect
IsWindow
EqualRect
IsZoomed
UpdateWindow
EnableWindow
gdi32
GetObjectA
BitBlt
CreateCompatibleDC
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
ole32
CoTaskMemAlloc
CLSIDFromProgID
CoCreateInstance
CoTaskMemFree
oleaut32
SysAllocString
GetErrorInfo
VariantClear
SysAllocStringLen
SysFreeString
SysStringLen
Sections
.text Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 600KB - Virtual size: 600KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE