Static task
static1
Behavioral task
behavioral1
Sample
7a26287377a321cd51c0dbc5868b477164f881c431d88e3934e4ce4da992eeb5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7a26287377a321cd51c0dbc5868b477164f881c431d88e3934e4ce4da992eeb5.exe
Resource
win10v2004-20220812-en
General
-
Target
7a26287377a321cd51c0dbc5868b477164f881c431d88e3934e4ce4da992eeb5
-
Size
300KB
-
MD5
33baabe3f84822fdb2b9d52a71e81a61
-
SHA1
ec6dded137965e30e835d033f60ca863ab2e2929
-
SHA256
7a26287377a321cd51c0dbc5868b477164f881c431d88e3934e4ce4da992eeb5
-
SHA512
f93c31111d0080e89e1382a57643db9589a14a9af54eb670a79b3d4faa285d52e05e66a29952b4ef5185ec5947ac69af39780f611904242ef6d66c32b3893270
-
SSDEEP
6144:CYM96mKQc+cqYbODO9BCEqmE27GNBY4cMUc+7oQT:tM96mK/i+MEj7Gz3cMIF
Malware Config
Signatures
Files
-
7a26287377a321cd51c0dbc5868b477164f881c431d88e3934e4ce4da992eeb5.exe windows x86
4ae9ef476a53db41b130b5440d1260a3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
waveOutGetNumDevs
waveOutReset
waveOutGetDevCapsA
kernel32
VirtualQuery
DeleteCriticalSection
VirtualFree
CompareStringA
GetCurrentProcess
GlobalReAlloc
VirtualProtect
LocalReAlloc
GetStringTypeA
CreateProcessA
GlobalFindAtomA
GetLocalTime
SetThreadPriority
SetStdHandle
IsBadWritePtr
FindResourceA
MulDiv
WaitForSingleObject
LoadResource
ExitThread
MultiByteToWideChar
GetVolumeInformationA
GetFileSize
GetCurrentThreadId
GetProcessVersion
InterlockedExchange
GetThreadPriority
GetThreadLocale
GetFileAttributesA
TlsGetValue
GetPrivateProfileIntA
GetEnvironmentStringsW
LeaveCriticalSection
GetStringTypeExA
ExitProcess
GetCPInfo
LocalAlloc
VirtualAlloc
IsBadReadPtr
GetPrivateProfileStringA
GlobalDeleteAtom
OutputDebugStringA
MoveFileA
HeapCreate
FindNextFileA
SetFileAttributesA
InitializeCriticalSection
SetLastError
RtlUnwind
WriteFile
GlobalSize
SetUnhandledExceptionFilter
GetACP
lstrcatA
lstrcpyW
HeapAlloc
SetEndOfFile
GetSystemTimeAsFileTime
CreateMutexA
HeapReAlloc
WritePrivateProfileStringA
GetLastError
GetTickCount
HeapFree
InterlockedDecrement
FlushFileBuffers
lstrlenW
TlsFree
CopyFileA
DeleteFileA
GetEnvironmentStrings
SizeofResource
GetTempFileNameA
GetModuleHandleA
QueryPerformanceCounter
GetShortPathNameA
SetHandleCount
DebugBreak
SetFileTime
LoadLibraryA
GetVersion
TerminateProcess
LCMapStringA
lstrcpyA
TlsSetValue
LockFile
UnlockFile
TlsAlloc
GlobalHandle
SuspendThread
GetWindowsDirectoryA
IsBadCodePtr
lstrcpynA
RemoveDirectoryA
GetVersionExA
GetProfileIntA
SystemTimeToFileTime
DuplicateHandle
FormatMessageA
ReadFile
FreeLibrary
GetTimeZoneInformation
GetOEMCP
lstrcmpiA
GetCurrentProcessId
WideCharToMultiByte
CompareStringW
FreeEnvironmentStringsW
HeapValidate
GetProcAddress
GlobalLock
GetStartupInfoA
GetStdHandle
FreeEnvironmentStringsA
GlobalUnlock
GlobalFlags
GetFileType
GetSystemTime
GetStringTypeW
FreeResource
GetExitCodeProcess
LCMapStringW
GetModuleFileNameA
InterlockedIncrement
EnterCriticalSection
GetCommandLineA
CloseHandle
GetCurrentDirectoryA
SetErrorMode
RaiseException
SetFilePointer
HeapDestroy
UnhandledExceptionFilter
SetEnvironmentVariableA
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegEnumKeyA
CryptDestroyHash
CryptHashData
RegQueryValueExA
RegQueryValueA
CryptCreateHash
RegCloseKey
version
GetFileVersionInfoA
VerQueryValueA
gdi32
SetPixel
StretchDIBits
GetBkMode
CreateRectRgn
StartPage
Ellipse
SelectObject
GetBkColor
CreateEllipticRgn
CreateCompatibleDC
FrameRgn
CreatePalette
CreateFontIndirectA
GetWindowExtEx
GetStockObject
RectVisible
GetNearestPaletteIndex
Escape
GetRgnBox
DPtoLP
GetDeviceCaps
IntersectClipRect
SetWindowOrgEx
DeleteObject
GetClipRgn
StretchBlt
CreateSolidBrush
EndDoc
CreatePen
ScaleViewportExtEx
RealizePalette
CreateFontIndirectW
ScaleWindowExtEx
DeleteDC
SetPixelV
GetObjectA
CreateBitmap
Rectangle
SetBkMode
CreatePatternBrush
GetTextExtentPoint32W
GetCurrentPositionEx
SetBkColor
EndPage
CreateCompatibleBitmap
comdlg32
GetOpenFileNameA
GetSaveFileNameA
user32
DrawFrameControl
SendDlgItemMessageA
IsRectEmpty
EmptyClipboard
MoveWindow
CheckDlgButton
CreateWindowExA
PtInRect
IsChild
SetWindowTextA
LoadImageA
DeleteMenu
GetSysColorBrush
PostMessageA
GetWindowPlacement
DrawEdge
KillTimer
InvalidateRect
CreateDialogIndirectParamA
GetWindowThreadProcessId
CallWindowProcA
MapWindowPoints
SetRectEmpty
RegisterWindowMessageA
SetClipboardData
ExitWindowsEx
GetWindow
CreateMenu
InsertMenuItemA
IsZoomed
MessageBoxA
ClientToScreen
LoadIconA
SetWindowLongA
AppendMenuA
SetFocus
SetTimer
SetForegroundWindow
ShowScrollBar
GetCapture
ReleaseCapture
SetRect
FillRect
GetWindowTextA
TranslateMessage
DrawIconEx
GetClassLongA
GetForegroundWindow
BeginPaint
DrawIcon
GetMenuItemCount
UnregisterHotKey
LoadStringA
ModifyMenuA
IsIconic
TrackPopupMenu
GetKeyboardState
RegisterClassExA
UnhookWindowsHookEx
IsDialogMessageA
CallNextHookEx
DrawStateA
RegisterHotKey
GetMessagePos
PostQuitMessage
TrackPopupMenuEx
GetParent
ShowWindow
RegisterClipboardFormatA
SetWindowsHookExA
GetDC
GetWindowDC
SetMenuDefaultItem
SetParent
SendMessageA
IsWindowEnabled
CheckRadioButton
DestroyWindow
IsWindowVisible
OffsetRect
WindowFromPoint
GetMenuState
CopyRect
GetAsyncKeyState
LoadMenuA
ScreenToClient
GetClientRect
CharNextA
SetActiveWindow
GetMessageA
ShowCaret
GetPropA
GetCursorPos
GetNextDlgGroupItem
GetMenuItemID
GetDlgItem
GrayStringA
EnableWindow
LoadBitmapA
RedrawWindow
DestroyMenu
GetKeyState
SystemParametersInfoA
SetDlgItemTextA
PeekMessageA
RemoveMenu
SetCursor
GetIconInfo
DeferWindowPos
SetPropA
GetSystemMetrics
GetSysColor
HideCaret
FindWindowA
GetTopWindow
DestroyIcon
CloseClipboard
DefWindowProcA
AdjustWindowRectEx
EndPaint
GetActiveWindow
RegisterClassA
InflateRect
GetWindowLongA
Sections
.text Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 60KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ