Static task
static1
Behavioral task
behavioral1
Sample
7a50d28970e1590ae98ebb3b1b81d3631b358e3c8cebf8f46a80cd4b507fb6d7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7a50d28970e1590ae98ebb3b1b81d3631b358e3c8cebf8f46a80cd4b507fb6d7.exe
Resource
win10v2004-20220812-en
General
-
Target
7a50d28970e1590ae98ebb3b1b81d3631b358e3c8cebf8f46a80cd4b507fb6d7
-
Size
876KB
-
MD5
33de987dd96c4724ec44d470023574d7
-
SHA1
c43ed5c70b4e54536d18f80cd1cd8d7a607f42b9
-
SHA256
7a50d28970e1590ae98ebb3b1b81d3631b358e3c8cebf8f46a80cd4b507fb6d7
-
SHA512
43b6b578eb32d2e1fb931245e05ac4663f4a05762dea6d00f631d723cf7b95183fca2c6768e3fc5f40b18d5bcd902c88efff6df9dddf2d45399c428182d49416
-
SSDEEP
12288:GV49jw/BfPDursE/xFMj/0+YrBJevlJTm49oQZ6fWMT0sflge7EsU3E8vbwxT:GUBvoj/AalA49QuMT0sfClsU08vb
Malware Config
Signatures
Files
-
7a50d28970e1590ae98ebb3b1b81d3631b358e3c8cebf8f46a80cd4b507fb6d7.exe windows x86
87c427e2dc00e1d37834b991dcb12c05
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
GlobalFree
GlobalHandle
FindClose
LocalFree
ReadFile
FlushFileBuffers
GetLocalTime
SetEndOfFile
GetUserDefaultLangID
CreateThread
IsBadReadPtr
GetCurrentProcessId
SetUnhandledExceptionFilter
GetCommandLineW
UnmapViewOfFile
InterlockedIncrement
MapViewOfFile
SetEvent
FreeLibrary
GetSystemDefaultLangID
CompareStringA
GetModuleHandleA
GetModuleFileNameA
GetWindowsDirectoryA
GetSystemDirectoryA
LoadLibraryA
InterlockedDecrement
WaitForSingleObject
SetFilePointer
CloseHandle
WriteFile
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
ExitProcess
HeapSize
HeapReAlloc
HeapDestroy
GetVersionExA
GetCurrentProcess
FlushInstructionCache
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
SizeofResource
MulDiv
GetProcessHeap
HeapFree
SetLastError
lstrlenA
LoadResource
LockResource
GlobalAlloc
GlobalLock
GlobalUnlock
GetLastError
RaiseException
DeleteCriticalSection
InitializeCriticalSection
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
user32
FillRect
EndDialog
GetWindow
MapDialogRect
DestroyWindow
SetWindowPos
GetDlgItem
SetWindowContextHelpId
DestroyAcceleratorTable
GetSysColor
GetFocus
SetFocus
IsChild
ReleaseDC
GetDC
EndPaint
BeginPaint
GetClientRect
IsWindow
RedrawWindow
GetParent
GetDesktopWindow
ReleaseCapture
SetCapture
InvalidateRect
InvalidateRgn
GetSystemMetrics
PostQuitMessage
ShowWindow
GetMenuItemID
IsMenu
GetWindowRect
PtInRect
GetCursorPos
TrackMouseEvent
SetForegroundWindow
AttachThreadInput
GetWindowThreadProcessId
GetForegroundWindow
SetCursor
GetActiveWindow
CreatePopupMenu
EnableMenuItem
GetKeyState
GetDlgCtrlID
MapWindowPoints
DestroyMenu
TrackPopupMenu
CopyRect
DrawMenuBar
GetSystemMenu
IsIconic
SetTimer
SetWindowRgn
TrackPopupMenuEx
WaitForInputIdle
InflateRect
TranslateMessage
GetMenuItemCount
gdi32
SetTextColor
SelectClipRgn
GetDeviceCaps
DeleteDC
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
CreateSolidBrush
SetMapMode
DeleteObject
SetBkMode
CreateRectRgn
CreatePen
SelectObject
MoveToEx
GetStockObject
LineTo
shell32
ord43
shlwapi
PathCanonicalizeW
PathFileExistsW
PathFindExtensionW
PathFindFileNameW
comctl32
InitCommonControlsEx
xmlparse
XML_ParserCreate
XML_Parse
XML_ParserFree
XML_SetUserData
XML_SetElementHandler
ole32
CoTaskMemRealloc
CoTaskMemFree
CoInitializeEx
CoUninitialize
CoInitialize
OleRun
OleLockRunning
CoTaskMemAlloc
StringFromGUID2
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
oleaut32
UnRegisterTypeLi
RegisterTypeLi
VarBstrCmp
VarBstrCat
GetErrorInfo
SysAllocStringByteLen
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
SysStringByteLen
VariantClear
VariantInit
SysAllocString
SysStringLen
SysAllocStringLen
SysFreeString
VarUI4FromStr
gdiplus
GdipGetCellAscent
GdipCreateFont
GdipDeleteFont
GdipCreateImageAttributes
GdipDisposeImageAttributes
GdipSetImageAttributesColorMatrix
GdipCreateMatrix
GdipDeleteMatrix
GdipTranslateMatrix
GdipScaleMatrix
GdipSetTextRenderingHint
GdipSetWorldTransform
GdipMeasureString
GdipDrawImageRectRect
GdipDrawImageRectRectI
GdipLoadImageFromFile
GdipLoadImageFromFileICM
GdipDisposeImage
GdipCloneImage
GdipGetImageDimension
GdipGetImageWidth
GdipGetImageHeight
GdiplusShutdown
GdipCreateSolidFill
GdipDeleteBrush
GdipCloneBrush
GdipFree
GdipAlloc
GdipCreateStringFormat
GdipDeleteStringFormat
GdipSetStringFormatFlags
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipSetStringFormatHotkeyPrefix
GdipCreateFromHDC
GdipDeleteGraphics
GdipFillRectangleI
GdipDrawString
GdipCreateFontFamilyFromName
GdipDeleteFontFamily
GdipFillRectangle
GdipDrawLineI
GdipGetLineSpacing
GdipIsStyleAvailable
GdipFillPolygonI
GdipDrawPolygonI
GdipDrawRectangleI
GdipDrawRectangle
GdipSetSmoothingMode
GdipSetPenDashStyle
GdipSetPenWidth
GdipDeletePen
GdipCreatePen1
GdipSetSolidFillColor
GdiplusStartup
msvcr71
_c_exit
_exit
_XcptFilter
_cexit
exit
_wcmdln
_amsg_exit
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
?what@exception@@UBEPBDXZ
?terminate@@YAXXZ
__dllonexit
_onexit
??1type_info@@UAE@XZ
_controlfp
??0exception@@QAE@ABQBD@Z
??1exception@@UAE@XZ
_callnewh
__security_error_handler
??0exception@@QAE@ABV0@@Z
wcsncpy
_wcsset
wcscspn
wcsspn
wcscat
wcscpy
_vsnwprintf
abs
vswprintf
_vscwprintf
_wcslwr
wcsrchr
wcsstr
wcscmp
iswspace
??_V@YAXPAX@Z
memset
_except_handler3
__CxxFrameHandler
free
swprintf
memcpy
_CxxThrowException
malloc
wcslen
memcmp
memmove
realloc
_wcsicmp
_wtoi
wcstol
??3@YAXPAX@Z
msvcp71
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
Sections
.text Size: 300KB - Virtual size: 299KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 96KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tc Size: 400KB - Virtual size: 400KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE