Static task
static1
Behavioral task
behavioral1
Sample
7cae4423a38e4a1c8d424e5b8a2f776b063a794d1030aa06e41cd106ae8c427a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7cae4423a38e4a1c8d424e5b8a2f776b063a794d1030aa06e41cd106ae8c427a.exe
Resource
win10v2004-20220901-en
General
-
Target
7cae4423a38e4a1c8d424e5b8a2f776b063a794d1030aa06e41cd106ae8c427a
-
Size
108KB
-
MD5
5c9569ef789e5e30db74421fd04bf1b7
-
SHA1
9afa2664be38e7d6cad43a65cb524a05960897a9
-
SHA256
7cae4423a38e4a1c8d424e5b8a2f776b063a794d1030aa06e41cd106ae8c427a
-
SHA512
3311955396b0441df91c28316fc9046cfe663e1204b907048f5e7f76c46dbbd63aac361321bcd6fc58fd5bb2c7bdacb8d0aee66a4ee0769391eb848113dd274e
-
SSDEEP
1536:zoBJvNmH6rNvxi0Qc3dIGAT01mMGlwkqCIEnP:zozVZvJm01mBvqTEnP
Malware Config
Signatures
Files
-
7cae4423a38e4a1c8d424e5b8a2f776b063a794d1030aa06e41cd106ae8c427a.exe windows x86
b3fe98783c971443e9a7e6cadf916a81
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
HttpQueryInfoW
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetCloseHandle
InternetOpenUrlW
InternetOpenW
InternetOpenUrlA
InternetCanonicalizeUrlW
InternetReadFile
ole32
CoInitialize
CoCreateInstance
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ws2_32
gethostbyname
WSAStartup
WSACleanup
shlwapi
PathGetCharTypeW
kernel32
LoadLibraryA
ReadFile
GetFileSize
CreateFileMappingA
MapViewOfFile
RtlMoveMemory
RtlZeroMemory
VirtualProtect
lstrcmpA
lstrcpynA
lstrlenA
LockResource
LoadResource
CreateProcessA
lstrcatA
Sleep
GetVersionExA
ExitProcess
CloseHandle
GetModuleFileNameA
GetDiskFreeSpaceExA
CreateDirectoryA
CreateFileA
SystemTimeToFileTime
GetSystemTime
CreateMutexA
MoveFileA
DeleteFileA
OutputDebugStringA
CopyFileA
GetWindowsDirectoryA
lstrcpyA
MulDiv
FlushFileBuffers
WriteFile
SetFilePointer
GetLastError
ExitThread
TerminateThread
CreateThread
SizeofResource
FreeLibrary
RtlUnwind
CompareStringA
InterlockedExchange
GetModuleHandleA
GetSystemDirectoryA
SetLastError
HeapAlloc
GetProcessHeap
HeapFree
GetStartupInfoA
GetCommandLineA
UnmapViewOfFile
GetTickCount
user32
CharLowerA
SendMessageA
GetDlgItem
CreateDialogParamA
GetMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
SetDlgItemTextA
GetDlgItemTextA
SetFocus
GetDC
InvalidateRect
SetWindowPos
ShowWindow
SetForegroundWindow
IsWindowVisible
EnableMenuItem
GetSystemMenu
gdi32
CreateFontIndirectA
GetDeviceCaps
advapi32
RegSetValueExA
RegCloseKey
RegDeleteValueA
RegQueryValueExA
RegCreateKeyExA
RegDeleteKeyA
OpenSCManagerW
RegFlushKey
RegOpenKeyExA
CloseServiceHandle
Sections
.text Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ