Static task
static1
Behavioral task
behavioral1
Sample
07949430adc64d71082c98db1a277692d859b7fda7ec21235e63621c1e4650e8.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
07949430adc64d71082c98db1a277692d859b7fda7ec21235e63621c1e4650e8.exe
Resource
win10v2004-20220812-en
General
-
Target
07949430adc64d71082c98db1a277692d859b7fda7ec21235e63621c1e4650e8
-
Size
281KB
-
MD5
615a28023537b14332213b525aeca810
-
SHA1
d227e2a6465586dea3c62029ff37c22c6e48fd02
-
SHA256
07949430adc64d71082c98db1a277692d859b7fda7ec21235e63621c1e4650e8
-
SHA512
a1af3e84e927d95d7bec0e4fd288b3900a80228bd421fcd3011e6eaf1e318704bf1be2ac8da1a5fd79f5027a7fab97e9bb559d618d0a2b917fb6ca4d067fbf70
-
SSDEEP
6144:KsXeMUkYZkDX+ii/JvvD3b+e3tWnOahz7ms48BhvCc:pOzksk74Bv7rdOFM8J
Malware Config
Signatures
Files
-
07949430adc64d71082c98db1a277692d859b7fda7ec21235e63621c1e4650e8.exe windows x86
3ee5246d7cbc661af1605bd3be59623b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
VarUI1FromBool
VarCyRound
VarMonthName
VarCyFromI1
VarBoolFromI1
DispInvoke
VarDecFromDate
SafeArrayDestroyDescriptor
VarDateFromR4
VarCyFromI2
VarUI1FromStr
VarDecCmpR8
VarBstrFromI4
VarBoolFromR4
SafeArrayCopy
VarI2FromR4
VarI1FromCy
LPSAFEARRAY_UserFree
GetActiveObject
VarI4FromDate
user32
DrawIconEx
DlgDirSelectComboBoxExW
GetPriorityClipboardFormat
GetUserObjectInformationA
CheckRadioButton
GetWindowModuleFileNameW
SetDoubleClickTime
DdeSetQualityOfService
OpenWindowStationW
PeekMessageW
OpenInputDesktop
FlashWindow
DestroyWindow
GrayStringW
MsgWaitForMultipleObjects
msvcrt
_initterm
__setusermatherr
_adjust_fdiv
__p__fmode
__set_app_type
__getmainargs
_exit
_XcptFilter
exit
_except_handler3
__p__commode
_controlfp
__dllonexit
_onexit
_acmdln
ole32
OleCreateLinkToFile
HBITMAP_UserUnmarshal
CLIPFORMAT_UserMarshal
CoFileTimeNow
ReadFmtUserTypeStg
OleCreateLinkFromData
OleCreateFromData
STGMEDIUM_UserUnmarshal
GetConvertStg
CreateDataCache
CoLockObjectExternal
HWND_UserFree
CoTaskMemFree
HBITMAP_UserFree
gdi32
CopyMetaFileW
Pie
CreateICA
OffsetWindowOrgEx
CreateEllipticRgn
ExtCreateRegion
GetCharWidthFloatW
SaveDC
DeleteEnhMetaFile
TextOutW
GetTextCharsetInfo
kernel32
ExitProcess
GetModuleHandleA
GetStartupInfoA
shell32
SHBrowseForFolderA
SHQueryRecycleBinW
ShellExecuteA
ShellExecuteExA
Shell_NotifyIconA
SHGetSpecialFolderPathA
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ