Static task
static1
Behavioral task
behavioral1
Sample
7de378225aa8e09343561014d952d1081c1d1afd84d84a287caf3fc5980b42ce.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7de378225aa8e09343561014d952d1081c1d1afd84d84a287caf3fc5980b42ce.exe
Resource
win10v2004-20220812-en
General
-
Target
7de378225aa8e09343561014d952d1081c1d1afd84d84a287caf3fc5980b42ce
-
Size
743KB
-
MD5
683d192e73d1cb316465dc9755cf7707
-
SHA1
fa51e6c5eb39a7925b610264025879a558ecb512
-
SHA256
7de378225aa8e09343561014d952d1081c1d1afd84d84a287caf3fc5980b42ce
-
SHA512
654e84cd7d946b3891f65ac74e27d5657861604a5e5672fa63a96a1165a7ce002854b51b18ef211999457133169f80b53f87b5451d8ce0f1f512953a0c96c9e1
-
SSDEEP
12288:1IYDgoUHsA2fmYHd6KSVv2d6VJYUwJ5z6QPC3pW/yEI7qCj9xtMjRwi4UAzDc/CD:1LUMTT96KMvCzlJ1ipW/y5tjujR347vD
Malware Config
Signatures
Files
-
7de378225aa8e09343561014d952d1081c1d1afd84d84a287caf3fc5980b42ce.exe windows x86
c455eebb2c806cb0aa6c1eec27c41ec4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegDeleteKeyA
user32
PostQuitMessage
SetWindowPos
IsWindow
EndPaint
GetDC
GetActiveWindow
DestroyWindow
GetMessageA
UpdateWindow
EnableWindow
TranslateMessage
IsWindowEnabled
LoadStringA
GetWindowLongA
SetTimer
FillRect
SetFocus
DefWindowProcA
GetSystemMetrics
GetWindowRect
PostMessageA
SetWindowLongA
CheckMenuItem
GetDlgItem
ScreenToClient
LoadCursorA
GetDesktopWindow
GetSystemMenu
EndDialog
MoveWindow
MessageBoxA
GetSysColor
SystemParametersInfoA
InvalidateRect
SendMessageA
GetClientRect
SetCursor
kernel32
GetStdHandle
GetConsoleOutputCP
GetFileAttributesA
LockResource
HeapDestroy
GetFileAttributesW
FreeEnvironmentStringsA
HeapReAlloc
GetConsoleMode
LocalAlloc
LoadLibraryExW
SetStdHandle
GetTempPathA
WideCharToMultiByte
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
GetDiskFreeSpaceA
GetStringTypeW
FreeLibrary
LocalFree
GetExitCodeProcess
InitializeCriticalSection
TlsGetValue
FormatMessageA
SetLastError
GetEnvironmentVariableA
GetModuleFileNameW
VirtualProtect
IsDebuggerPresent
HeapAlloc
FlushFileBuffers
GetModuleFileNameA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
SetFilePointer
GetLastError
GetTickCount
GetVersion
GetCommandLineA
GetModuleHandleA
GetCurrentThreadId
GetCurrentProcessId
GetCurrentThread
ExitProcess
VirtualAlloc
GetOEMCP
SetConsoleCtrlHandler
Sleep
VirtualFree
UnmapViewOfFile
IsValidCodePage
CreateProcessA
GetEnvironmentStrings
GetModuleHandleW
GlobalLock
GetACP
CloseHandle
ReadFile
MapViewOfFile
RaiseException
HeapSize
GetCPInfo
SizeofResource
CreateProcessW
lstrlenW
GlobalUnlock
GetEnvironmentStringsW
LCMapStringA
GlobalFree
lstrlenA
LCMapStringW
LeaveCriticalSection
GetProcessHeap
CreateFileA
GetFileType
CreateFileW
GetProcAddress
FindNextFileA
CompareStringA
FindFirstFileA
lstrcmpA
GetStartupInfoW
GetSystemInfo
WaitForMultipleObjects
GetWindowsDirectoryA
DeleteFileA
CreateDirectoryA
GetFileSize
GetStartupInfoA
LoadLibraryA
GetVersionExA
TlsAlloc
QueryPerformanceCounter
SetEvent
LoadLibraryW
EnterCriticalSection
HeapFree
InterlockedIncrement
GetLocaleInfoA
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
CreateThread
Sections
.text Size: 709KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ