Static task
static1
Behavioral task
behavioral1
Sample
7e8a8f373dd401da23337f8dd705806c1f9a423b7b10dc0fa3fbca05a1f952fa.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7e8a8f373dd401da23337f8dd705806c1f9a423b7b10dc0fa3fbca05a1f952fa.exe
Resource
win10v2004-20220812-en
General
-
Target
7e8a8f373dd401da23337f8dd705806c1f9a423b7b10dc0fa3fbca05a1f952fa
-
Size
110KB
-
MD5
91f11b8c42433ba5ad3d57d4ea53f240
-
SHA1
b61c8dc8475542d42434fcfb23fef12d6bd3855c
-
SHA256
7e8a8f373dd401da23337f8dd705806c1f9a423b7b10dc0fa3fbca05a1f952fa
-
SHA512
ae58141b5186102825e7c83cbd0e1a1f127015df92c95eba30fcac35e5c94c260b5b847f9bb7aed1cd5ddebaaf7cd67e3fe65ffeefa0807e0168a99655183da6
-
SSDEEP
1536:65xRkf27vzD0VGaXjOnvy2r13qGpE7kR/1rYghniuWwqPz3LAK0sCYXSLANJq6pd:6++rBqE+Gpzjhi3wqP/WsB1LVN7F9
Malware Config
Signatures
Files
-
7e8a8f373dd401da23337f8dd705806c1f9a423b7b10dc0fa3fbca05a1f952fa.exe windows x86
b851c19ea0ad987d1f4e59e11b70ed7d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
msvcrt
__p__fmode
__setusermatherr
_exit
__set_app_type
__p__commode
_XcptFilter
_except_handler3
__p___initenv
_controlfp
__getmainargs
_initterm
_adjust_fdiv
kernel32
GetSystemTimeAsFileTime
OutputDebugStringA
RemoveDirectoryA
GetCurrentProcess
GetExitCodeProcess
GetStringTypeExA
InterlockedExchange
MultiByteToWideChar
GetStdHandle
VirtualProtect
GetCommandLineW
LocalFree
lstrcmpiW
GetFileAttributesW
GetTempPathA
GetStartupInfoA
MoveFileA
DeleteFileA
LocalAlloc
lstrcpyA
SetThreadLocale
lstrcmpiA
SetHandleCount
GlobalReAlloc
lstrlenW
FreeEnvironmentStringsW
UnhandledExceptionFilter
EnumCalendarInfoA
lstrlenA
WritePrivateProfileStringA
GetUserDefaultLangID
GetCurrentThreadId
GetModuleHandleA
GetSystemDefaultLCID
GetThreadLocale
WriteConsoleA
IsDebuggerPresent
LoadResource
SetLastError
GetVersionExA
GetSystemDirectoryA
GetModuleHandleW
FlushFileBuffers
CreateFileMappingA
GetStartupInfoW
GetPrivateProfileStringA
advapi32
AllocateAndInitializeSid
CheckTokenMembership
RegQueryValueExW
GetTokenInformation
InitiateSystemShutdownA
RegOpenKeyExW
RegFlushKey
RegCloseKey
OpenProcessToken
RegQueryValueA
CryptDestroyHash
CopySid
RegEnumKeyExW
CryptGenRandom
CloseServiceHandle
DeleteService
RegCreateKeyExA
RevertToSelf
AddAccessAllowedAce
RegDeleteValueW
RegEnumKeyA
RegSetValueExA
SetSecurityDescriptorGroup
RegQueryInfoKeyW
RegQueryValueExA
RegSetValueExW
InitializeSecurityDescriptor
AdjustTokenPrivileges
ControlService
RegCreateKeyA
RegEnumKeyW
SetSecurityDescriptorOwner
OpenSCManagerA
FreeSid
CryptCreateHash
user32
GetWindow
IsWindowVisible
RegisterClassA
ShowCursor
SendMessageA
EndDialog
RedrawWindow
BeginPaint
GetSystemMetrics
InsertMenuA
GetMenuItemCount
EnumWindows
SetActiveWindow
GetWindowTextA
OemToCharA
SetWindowTextA
ReleaseDC
SetWindowPlacement
GetForegroundWindow
IsWindow
GetScrollInfo
MessageBeep
WaitMessage
SetForegroundWindow
CallNextHookEx
EndPaint
OffsetRect
GetSysColorBrush
GetKeyState
CreateWindowExA
WindowFromPoint
TranslateMessage
EmptyClipboard
InsertMenuItemA
GetDC
IsZoomed
wsprintfA
CreatePopupMenu
EnableMenuItem
GetClassNameA
Sections
.text Size: 1024B - Virtual size: 812B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE