Static task
static1
Behavioral task
behavioral1
Sample
7702bc01e99effda89f710e98c99bf683ca19f43fbdb3c6343983ad8afe604a9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7702bc01e99effda89f710e98c99bf683ca19f43fbdb3c6343983ad8afe604a9.exe
Resource
win10v2004-20220812-en
General
-
Target
7702bc01e99effda89f710e98c99bf683ca19f43fbdb3c6343983ad8afe604a9
-
Size
700KB
-
MD5
4e78550e0feb240d6faadc5647395460
-
SHA1
4ad64892f492a17fd5f18bef9149e95b2098967f
-
SHA256
7702bc01e99effda89f710e98c99bf683ca19f43fbdb3c6343983ad8afe604a9
-
SHA512
987e252d95347de2c990532ed2c1bcfaf6eb689f73560e1d79dc2aff9cb8ef68f5556253060981dd3e884e827550ca29c98c177a66996931fa46509b043e931e
-
SSDEEP
12288:92GovvYeDWVjmiYhA+7/1J1ZuMBHtGXUvIgw5pAjj7XTm6pcyENbFen51:a3YeDWJUspA3TTm6Hln5
Malware Config
Signatures
Files
-
7702bc01e99effda89f710e98c99bf683ca19f43fbdb3c6343983ad8afe604a9.exe windows x86
3f53ceff26e5943fd183d7432cb10fa9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
ord6
CreateToolbarEx
winmm
timeGetTime
PlaySoundA
kernel32
CreateDirectoryA
GetVersionExA
MulDiv
GetStdHandle
AllocConsole
SetEndOfFile
SetFilePointer
WriteConsoleA
GetComputerNameA
OpenEventA
SearchPathA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ReleaseSemaphore
CreateSemaphoreA
SetThreadPriority
TlsSetValue
DuplicateHandle
GetCurrentThread
GetCurrentProcess
TlsAlloc
TlsGetValue
GetSystemTime
CompareStringW
CompareStringA
GetOEMCP
GetACP
LCMapStringW
LCMapStringA
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetCPInfo
GetStringTypeW
ReadFile
MultiByteToWideChar
IsBadCodePtr
IsBadReadPtr
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentDirectoryA
InterlockedIncrement
InterlockedDecrement
HeapSize
SetHandleCount
IsBadWritePtr
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
SetUnhandledExceptionFilter
FatalAppExitA
SetLastError
TlsFree
ExitThread
GetVersion
GetCommandLineA
GetStartupInfoA
TerminateProcess
ExitProcess
GetFullPathNameA
GetFileAttributesA
HeapAlloc
GetFileType
SetStdHandle
GetTimeZoneInformation
WideCharToMultiByte
GetLocalTime
HeapFree
RaiseException
RtlUnwind
QueryPerformanceCounter
QueryPerformanceFrequency
GetFileSize
GetFileTime
GetDiskFreeSpaceExA
CreateFileA
WriteFile
FlushFileBuffers
SystemTimeToFileTime
SetFileTime
GlobalFree
GetLogicalDriveStringsA
GetDriveTypeA
lstrlenA
SetErrorMode
FileTimeToLocalFileTime
FileTimeToSystemTime
CopyFileA
LoadLibraryA
GetProcAddress
FreeLibrary
DeleteFileA
GetModuleFileNameA
FindFirstFileA
FindNextFileA
FindClose
GetPrivateProfileStringA
GetPrivateProfileIntA
WritePrivateProfileStringA
GlobalAlloc
GlobalLock
GetSystemTimeAsFileTime
GlobalUnlock
OutputDebugStringA
GetCurrentThreadId
GetLastError
FormatMessageA
LocalFree
Beep
Sleep
SetEvent
CloseHandle
WaitForSingleObject
CreateThread
ResumeThread
CreateEventA
GetModuleHandleA
SetEnvironmentVariableA
SetConsoleCtrlHandler
GetLocaleInfoW
GetStringTypeA
user32
UnhookWindowsHookEx
CallNextHookEx
GetScrollInfo
IsDlgButtonChecked
GetMessageA
LoadKeyboardLayoutA
GetKeyboardState
ToAscii
GetKeyState
FillRect
LoadBitmapA
GetMenuItemCount
GetMenuStringA
ModifyMenuA
PtInRect
GetDesktopWindow
SetWindowRgn
OpenDesktopA
EnumDesktopWindows
CloseDesktop
FindWindowA
GetClassNameA
EnableWindow
MessageBeep
GetParent
SendDlgItemMessageA
PeekMessageA
TranslateMessage
GetWindowThreadProcessId
DestroyMenu
GetSubMenu
GetMenuItemID
SetMenuDefaultItem
TrackPopupMenu
LoadStringA
LoadMenuA
GetCursorPos
SetCursorPos
GetSystemMetrics
RedrawWindow
EmptyClipboard
SetClipboardData
GetClipboardOwner
LoadImageA
IsRectEmpty
DialogBoxParamA
SetDlgItemTextA
OpenClipboard
GetClipboardData
CloseClipboard
BeginPaint
EndPaint
GetForegroundWindow
GetWindow
GetFocus
SetCursor
IsWindow
ChangeClipboardChain
DispatchMessageA
SetWindowsHookExA
SetForegroundWindow
EndDialog
CreateAcceleratorTableA
TranslateAcceleratorA
DestroyAcceleratorTable
SetWindowLongA
GetDlgItemTextA
GetWindowLongA
SetWindowPos
wsprintfA
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
KillTimer
DefWindowProcA
DestroyWindow
SetTimer
ShowWindow
PostThreadMessageA
ShowScrollBar
PostQuitMessage
GetDlgItemInt
SetFocus
GetWindowRect
GetDlgItem
EnableMenuItem
IsIconic
InvalidateRgn
PostMessageA
GetKeyboardLayoutNameA
SetScrollInfo
ScrollWindowEx
DrawTextA
InvalidateRect
SystemParametersInfoA
SetRect
AdjustWindowRectEx
MoveWindow
SetWindowTextA
UpdateWindow
SetDlgItemInt
MessageBoxA
GetSystemMenu
AppendMenuA
DrawMenuBar
CheckMenuItem
SetClipboardViewer
RegisterClassA
GetDC
ReleaseDC
GetClientRect
SendMessageA
gdi32
SetTextColor
SetBkColor
CreateCompatibleBitmap
ExtTextOutA
RealizePalette
SelectPalette
SetDIBColorTable
CreateDIBSection
CombineRgn
CreateRectRgn
GetDeviceCaps
StretchBlt
SetBrushOrgEx
SetStretchBltMode
SetPixelV
CreateRectRgnIndirect
CreateFontIndirectA
GdiFlush
Rectangle
CreateFontA
CreatePolygonRgn
LineTo
MoveToEx
CreatePen
CreatePalette
SetBkMode
GetStockObject
GetClipBox
CreateCompatibleDC
CreateSolidBrush
SelectObject
PatBlt
BitBlt
DeleteObject
UpdateColors
DeleteDC
comdlg32
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
advapi32
RegQueryValueExA
RegCreateKeyA
RegCreateKeyExA
RegOpenKeyA
RegSetValueA
RegQueryInfoKeyA
RegEnumValueA
RegDeleteValueA
RegSetValueExA
RegCloseKey
shell32
Shell_NotifyIconA
wsock32
accept
inet_ntoa
recv
bind
listen
WSAAsyncSelect
shutdown
closesocket
WSACleanup
socket
ioctlsocket
gethostbyname
htons
connect
getpeername
select
WSAGetLastError
WSAStartup
setsockopt
send
Sections
.text Size: 408KB - Virtual size: 406KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kyghfet Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE