Static task
static1
Behavioral task
behavioral1
Sample
7bcfb54f1402a61ebc46d774895896f373dc3e7928f9cf8b58c14c07d419073c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7bcfb54f1402a61ebc46d774895896f373dc3e7928f9cf8b58c14c07d419073c.exe
Resource
win10v2004-20220901-en
General
-
Target
7bcfb54f1402a61ebc46d774895896f373dc3e7928f9cf8b58c14c07d419073c
-
Size
534KB
-
MD5
1622cfdc154d33900e0c805ee43e0f0c
-
SHA1
e270af5ea0f5d167191d7b25c9a22b5ea0beb9bc
-
SHA256
7bcfb54f1402a61ebc46d774895896f373dc3e7928f9cf8b58c14c07d419073c
-
SHA512
869256faea95e36ae47f1be5e9f5db05ba6b7a313a5f0a6e5e78d8b29410082bcf5d4998a3469a29686038970c340a71afec429e59798bfa6872cd5beb78f19e
-
SSDEEP
12288:MM8Kw0Xy8vBYAwLsDv5QAj7XckHYRxB2MQrqJwZSCmS:MRKw0XlvBpw4NQAj7XcgaxB2MQrqJj
Malware Config
Signatures
Files
-
7bcfb54f1402a61ebc46d774895896f373dc3e7928f9cf8b58c14c07d419073c.exe windows x86
5315952aa9ee7d70b2f9ecc7b452ccac
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CopyMetaFileA
CreatePolygonRgn
StretchBlt
RectInRegion
gdiPlaySpoolStream
GetOutlineTextMetricsA
SetFontEnumeration
SetMetaFileBitsEx
GetPixelFormat
ResizePalette
ScaleViewportExtEx
GetTextMetricsW
CreatePenIndirect
CreateDIBPatternBrushPt
GetCharacterPlacementA
CreatePen
GetGlyphOutline
user32
GetClientRect
GetClipboardFormatNameW
EnumDisplaySettingsA
OffsetRect
RegisterClassA
DdeClientTransaction
CharToOemBuffA
IsWindowUnicode
ToAscii
SetWindowsHookExA
RegisterClassExA
LoadBitmapA
DialogBoxParamA
SendIMEMessageExA
DdeAddData
OpenDesktopA
GetWindowTextA
OemToCharA
comctl32
ImageList_Write
ImageList_AddMasked
ImageList_Remove
MakeDragList
ImageList_Merge
DrawStatusTextW
ImageList_LoadImageW
ImageList_Add
InitCommonControlsEx
ImageList_SetBkColor
ImageList_GetImageRect
advapi32
RegCreateKeyA
RegConnectRegistryW
CryptGenKey
GetUserNameA
RegOpenKeyExW
CryptContextAddRef
RegEnumKeyW
ReportEventA
RegEnumKeyExA
RegSetValueA
DuplicateToken
InitiateSystemShutdownA
CryptSetProviderW
LookupAccountNameA
CryptSetProviderExA
RegQueryInfoKeyW
LookupPrivilegeDisplayNameA
CreateServiceW
LookupAccountSidW
RegSetValueW
CryptDecrypt
RegDeleteKeyW
CryptGetDefaultProviderW
CryptDestroyHash
kernel32
GetTimeFormatA
CloseHandle
OpenMutexA
GetCurrentThreadId
GetLastError
InitializeCriticalSection
SetEnvironmentVariableA
SetLocalTime
GetCurrentProcessId
TlsGetValue
GetStringTypeA
GetConsoleMode
LoadLibraryA
LCMapStringW
IsValidLocale
GetLocaleInfoW
IsDebuggerPresent
LeaveCriticalSection
MultiByteToWideChar
GetCurrentThread
WriteConsoleW
GetProcessHeap
EnumSystemLocalesA
GetACP
GetUserDefaultLCID
ReadConsoleOutputAttribute
GetOEMCP
GetCPInfo
InterlockedIncrement
SetFilePointer
GetStartupInfoA
GetLocaleInfoA
GetModuleFileNameA
TerminateProcess
FreeLibrary
IsValidCodePage
GetCurrentProcess
SetStdHandle
GetConsoleCP
QueryPerformanceCounter
ExitProcess
RtlUnwind
SetLastError
GetProcAddress
GetEnvironmentStringsW
SetConsoleCtrlHandler
CreateMutexA
InterlockedDecrement
GetDateFormatA
CreateFileA
GetSystemTimeAsFileTime
CompareStringW
GetCommandLineA
FreeEnvironmentStringsW
GetTimeZoneInformation
VirtualQuery
WriteFile
GetModuleHandleA
HeapFree
SetHandleCount
DeleteCriticalSection
VirtualAlloc
ReadFile
GetVersionExA
HeapAlloc
GetStringTypeW
LCMapStringA
Sleep
HeapSize
GetEnvironmentStrings
HeapDestroy
CompareStringA
GetStdHandle
FlushFileBuffers
TlsSetValue
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetConsoleOutputCP
EnterCriticalSection
VirtualFree
HeapReAlloc
GetTickCount
WriteConsoleA
HeapCreate
TlsAlloc
InterlockedExchange
SetUnhandledExceptionFilter
GetFileType
WideCharToMultiByte
TlsFree
shell32
SHGetNewLinkInfo
Sections
.text Size: 344KB - Virtual size: 343KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ