Static task
static1
Behavioral task
behavioral1
Sample
b214c8ca8a14033aa2819bfadc5a0e7f5126cea0e42ad4d5cd3e27a3d680f6a7.exe
Resource
win7-20220901-en
General
-
Target
b214c8ca8a14033aa2819bfadc5a0e7f5126cea0e42ad4d5cd3e27a3d680f6a7
-
Size
647KB
-
MD5
638d11dbb87523333812105ee53365d1
-
SHA1
d861ea082ddbdd0c39f877a8243593c1f7f6a316
-
SHA256
b214c8ca8a14033aa2819bfadc5a0e7f5126cea0e42ad4d5cd3e27a3d680f6a7
-
SHA512
6cf8370c7679fa6aa9451545959d3474413742ab79a75f563e630d4e86b2843582d2849bbb794b85180b3f67f2adcd0ba735ac2c424a0a61131041a1d7b8ee42
-
SSDEEP
12288:3tDSQR1f9PkZ7z5SdUkJu3y4VPmJIXdzyRKN51sk:dFRtFqH0Pg3nYJ2dziKNN
Malware Config
Signatures
Files
-
b214c8ca8a14033aa2819bfadc5a0e7f5126cea0e42ad4d5cd3e27a3d680f6a7.exe windows x86
e3aee052ea9bc3f4e023e0bb7bf30dd7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
GetSystemInfo
GetFullPathNameW
FileTimeToSystemTime
GetStringTypeA
GetModuleHandleW
GetLocaleInfoA
LeaveCriticalSection
SetEvent
ResumeThread
LoadLibraryA
GetLocalTime
TerminateThread
QueryPerformanceCounter
VirtualAlloc
RaiseException
GetCurrentProcessId
InterlockedDecrement
GetProcAddress
GlobalAlloc
GetDateFormatW
GetConsoleOutputCP
SetUnhandledExceptionFilter
GetCommandLineW
user32
DestroyCaret
GetDC
TranslateMessage
PostMessageW
EnableWindow
DrawTextW
LoadStringW
SetWindowLongA
SetWindowTextW
EndPaint
GetScrollPos
DestroyWindow
DispatchMessageA
DefWindowProcW
MoveWindow
IsIconic
IsWindowVisible
ShowCaret
BeginDeferWindowPos
SetCursor
GetMessageA
mouse_event
ClientToScreen
gdi32
SetBkMode
LineTo
CreateCompatibleDC
CreateHatchBrush
GetDeviceCaps
SetBrushOrgEx
SetBkColor
EndPage
CreateFontW
CreatePen
CreateSolidBrush
comdlg32
GetOpenFileNameW
PrintDlgW
GetSaveFileNameW
ChooseColorW
advapi32
RegOpenKeyExW
IsTextUnicode
RegDeleteKeyW
RegSetValueExW
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExW
RegCreateKeyExW
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 51KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hcovbqz Size: 59KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dadorwe Size: 131KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ucbjced Size: 131KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cixrhhm Size: 59KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kkuliee Size: 139KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
juqybgw Size: 4KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE