Static task
static1
Behavioral task
behavioral1
Sample
7a5f5ca2b077656b0a021f26f6f67601b151411a788c3d4e90e402f4fab4660a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7a5f5ca2b077656b0a021f26f6f67601b151411a788c3d4e90e402f4fab4660a.exe
Resource
win10v2004-20220812-en
General
-
Target
7a5f5ca2b077656b0a021f26f6f67601b151411a788c3d4e90e402f4fab4660a
-
Size
145KB
-
MD5
6ce2683642287f58182ecad0102daae0
-
SHA1
a51011b82e42e88e634640847204d93c04440cf1
-
SHA256
7a5f5ca2b077656b0a021f26f6f67601b151411a788c3d4e90e402f4fab4660a
-
SHA512
d33aa961c2e48650d442b674d35f1b970525ab2506478937e6523b97030c22d9db6da538b9b8ad27ade75995a068571c43c9955a4041949287ba1fe51723d546
-
SSDEEP
3072:fZFS+3k6ExX4vohvxDc5iotyf2OjzhANscmJzzGBkLoDpHNjz4DSI:RWxX/DcPtknzqBeoDzo+I
Malware Config
Signatures
Files
-
7a5f5ca2b077656b0a021f26f6f67601b151411a788c3d4e90e402f4fab4660a.exe windows x86
fb73170e9a17c8b985805b1397c822f1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
AppendMenuA
DialogBoxParamA
CreateIcon
CopyRect
DrawIcon
EndDialog
LoadCursorA
DrawIconEx
IsMenu
GetWindowTextLengthA
GetFocus
GetCursor
InsertMenuA
LoadCursorA
IsWindow
GetFocus
BlockInput
GetWindowTextA
AlignRects
IsMenu
LoadMenuA
CalcMenuBar
CopyRect
GetWindowTextLengthA
CopyIcon
CopyImage
DrawIconEx
DrawTextW
AppendMenuA
InsertMenuA
GetDlgItem
IsMenu
DrawTextA
CopyRect
LoadMenuA
CreateIcon
GetWindowTextLengthA
GetFocus
kernel32
GetCommandLineA
CreateProcessA
GetCurrentThreadId
Sleep
GetLastError
DeleteFileW
GetCurrentThread
OpenFile
GetFileTime
GetConsoleMode
GetUserDefaultLangID
ExitThread
CreateThread
FindAtomA
GetComputerNameA
GetCurrentProcessId
GlobalFree
GetOEMCP
GetCPInfo
GetCommandLineA
GetOEMCP
ExitProcess
GetConsoleOutputCP
CopyFileW
GetComputerNameA
OpenFile
Sleep
GetCurrentThread
DeleteFileA
GetCurrentProcess
GetUserDefaultLangID
GetConsoleMode
GetStdHandle
DeleteAtom
DeleteFileA
OpenFile
FindAtomA
CreateThread
GetCurrentProcessId
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
CreateDirectoryA
GetCPInfo
CreateProcessA
DeleteAtom
GetUserDefaultLCID
GetCurrentThread
GetOEMCP
GetCurrentThreadId
GlobalFree
GetFileTime
GetOEMCP
ExitProcess
CopyFileW
GetConsoleOutputCP
GetCommandLineA
FindFirstFileA
DeleteFileW
GetComputerNameA
GetFileSize
GetCPInfo
OpenFile
GetUserDefaultLangID
GetConsoleMode
CreateThread
GlobalFree
ExitThread
GetCurrentProcessId
GetComputerNameA
FindAtomA
GetCPInfo
ExitProcess
GetFileSize
GetLastError
GetCurrentThreadId
DeleteAtom
GetConsoleOutputCP
FindFirstFileA
GetCommandLineA
GetFileTime
advapi32
RegCreateKeyW
RegQueryValueW
RegOpenKeyExW
RegQueryValueA
RegLoadKeyA
RegQueryInfoKeyA
RegEnumKeyA
RegQueryValueExW
RegOpenKeyExA
RegReplaceKeyW
RegCreateKeyExW
RegOpenKeyW
RegDeleteKeyW
RegDeleteValueW
RegReplaceKeyA
RegDeleteValueA
RegEnumValueW
RegOpenKeyA
RegQueryInfoKeyW
RegQueryInfoKeyA
RegEnumKeyA
RegOpenKeyA
RegOpenKeyExA
RegLoadKeyA
RegDeleteValueW
RegOpenKeyW
RegEnumKeyW
RegReplaceKeyW
RegQueryInfoKeyW
RegFlushKey
RegEnumValueW
RegReplaceKeyA
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: 104KB - Virtual size: 412KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ