Static task
static1
Behavioral task
behavioral1
Sample
1ab715c7b55b1455b647eecb989376d2f620966f20a678c8961cf6d45341cd1c.exe
Resource
win7-20220812-en
General
-
Target
1ab715c7b55b1455b647eecb989376d2f620966f20a678c8961cf6d45341cd1c
-
Size
289KB
-
MD5
7a8a12841f26cfe23cbe88be78aa1b0b
-
SHA1
ba4c59757004d23376be8eb3f59e3a172e881190
-
SHA256
1ab715c7b55b1455b647eecb989376d2f620966f20a678c8961cf6d45341cd1c
-
SHA512
270eceb53a898cb868f3ce6c41b305de2fe05d72dc21e7d6c04a06ddd256b449231ad5e413d22b6b17a483463f77bed6e34f8b3bf3b0c4cd02c7751548f7ffdf
-
SSDEEP
6144:+q0M8OQAO5WSjcVxgGcj/Exkdm2xMhw9y:L0IE5cVflX0Mhx
Malware Config
Signatures
Files
-
1ab715c7b55b1455b647eecb989376d2f620966f20a678c8961cf6d45341cd1c.exe windows x86
e0645631469507a53fff2b011b90023d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetStockObject
SetTextColor
CreateFontIndirectA
DeleteObject
GetDeviceCaps
SetBkColor
SelectObject
GetTextMetricsA
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetMalloc
user32
MessageBoxA
UpdateWindow
UnregisterClassA
GetWindowLongA
PeekMessageA
CharNextA
DispatchMessageA
DestroyWindow
PostMessageA
PackDDElParam
CharPrevA
SetWindowTextA
BeginPaint
GetClientRect
EndPaint
DrawTextA
OffsetRect
IsWindow
PostQuitMessage
FindWindowA
GetSystemMetrics
ShowCursor
GetDC
ShowWindow
MoveWindow
ReleaseDC
BringWindowToTop
GetMessageA
TranslateMessage
wvsprintfA
SetFocus
InvalidateRect
LoadStringA
LoadCursorA
LoadIconA
UnpackDDElParam
ExitWindowsEx
wsprintfA
CreateWindowExA
DefWindowProcA
RegisterClassA
SendMessageA
comdlg32
GetOpenFileNameA
advapi32
AdjustTokenPrivileges
RegEnumKeyExA
OpenProcessToken
RegCloseKey
LookupPrivilegeValueA
RegSetValueExA
RegCreateKeyA
RegQueryInfoKeyA
RegOpenKeyExA
RegQueryValueExA
ole32
CoUninitialize
OleInitialize
OleUninitialize
CoCreateInstance
CoInitialize
oleaut32
SysAllocStringLen
VariantChangeTypeEx
VariantClear
VariantTimeToSystemTime
RegisterTypeLi
LoadTypeLi
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
VerInstallFileA
kernel32
OpenFile
GlobalFree
CloseHandle
GetCPInfo
SetFilePointer
LCMapStringA
GetCurrentProcessId
LCMapStringW
VirtualFree
HeapCreate
VirtualAlloc
SetStdHandle
GetStdHandle
HeapDestroy
SetEndOfFile
GetCommandLineA
SetHandleCount
SetCurrentDirectoryA
GetCurrentDirectoryA
GetStartupInfoA
GetLocalTime
GetSystemTime
SetEnvironmentVariableA
HeapFree
HeapAlloc
GetTimeZoneInformation
ExitProcess
FileTimeToLocalFileTime
TerminateProcess
GetFileType
FileTimeToSystemTime
GetFileAttributesA
RemoveDirectoryA
GetVersion
GetWindowsDirectoryA
GetSystemDirectoryA
GetVersionExA
HeapReAlloc
CreateFileA
LocalFree
SystemTimeToFileTime
LocalFileTimeToFileTime
CreateDirectoryA
GetModuleHandleA
GetDriveTypeA
SetFileTime
LoadLibraryA
GetProcAddress
GetExitCodeProcess
FlushFileBuffers
CompareStringW
GetStringTypeW
GetStringTypeA
RtlUnwind
GetEnvironmentStringsW
GetEnvironmentStrings
LocalAlloc
GlobalDeleteAtom
_lread
_lwrite
_lclose
GetFileSize
GetPrivateProfileStringA
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
lstrcatA
lstrcpyA
lstrlenA
lstrcmpiA
OutputDebugStringA
SetFileAttributesA
CopyFileA
GetModuleFileNameA
FindClose
Sleep
IsDBCSLeadByte
WriteFile
FindFirstFileA
GetFullPathNameA
FreeLibrary
SetErrorMode
LocalLock
MoveFileExA
GlobalAddAtomA
CreateProcessA
GlobalAlloc
lstrcpynA
GlobalUnlock
GlobalLock
GlobalFindAtomA
CompareStringA
GetShortPathNameA
GetTempPathA
MoveFileA
DeleteFileA
ReadFile
GetTempFileNameA
GetLastError
GetCurrentProcess
MultiByteToWideChar
WideCharToMultiByte
LocalUnlock
Sections
.text Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 15KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 91KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE