Static task
static1
Behavioral task
behavioral1
Sample
7e7c87badbae991ea0b5517ef1d89bfac21a58328e80116b5871fbb19b72d9f7.exe
Resource
win7-20220812-en
General
-
Target
7e7c87badbae991ea0b5517ef1d89bfac21a58328e80116b5871fbb19b72d9f7
-
Size
537KB
-
MD5
7ab53e83ca3f4222e8df6acf43e4edac
-
SHA1
0bf211ca380bfce77e3617b1b8f7e6b79a56f2a4
-
SHA256
7e7c87badbae991ea0b5517ef1d89bfac21a58328e80116b5871fbb19b72d9f7
-
SHA512
69e576e1df30370a12bd8a58090bc34eb2509ee89a4ccc793d0a1409130e38e9a13c20097e38d82aab89dc02aab8e2b13c5dbe4fc239cda0afee8ab1fbd1c6c9
-
SSDEEP
6144:E7wYoVrXWooNtKlCTc9jHeiVuzdFa5ZGzLI2hXWaBn4GgmRhXjxS6fgALAo4pg+E:EUVVrXboM2zE2lBFr5zaYNzRdJdyc
Malware Config
Signatures
Files
-
7e7c87badbae991ea0b5517ef1d89bfac21a58328e80116b5871fbb19b72d9f7.exe windows x86
df68918f1d754b2efea2af3058115004
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
Imports
shell32
ShellExecuteA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
user32
MessageBoxA
wvsprintfA
GetKeyboardType
wsprintfA
CharPrevA
LoadStringA
LoadIconA
IsCharAlphaNumericA
DispatchMessageA
TranslateMessage
PeekMessageA
MsgWaitForMultipleObjects
ReleaseDC
GetDC
MessageBoxIndirectA
MessageBeep
CharNextA
SetForegroundWindow
FindWindowA
PostQuitMessage
PostMessageA
DefWindowProcA
CreateWindowExA
UpdateWindow
ShowWindow
UnregisterClassA
RegisterClassExA
SetWindowLongA
DestroyWindow
InvalidateRect
GetWindowLongA
RegisterClassA
GetSystemMetrics
GetSysColor
BeginPaint
GetWindowRect
ExitWindowsEx
SetWindowPos
EndPaint
LoadCursorA
gdi32
SetBkMode
SelectObject
CreateFontIndirectA
SetTextColor
GetTextExtentPoint32A
TextOutA
GetStockObject
RemoveFontResourceA
AddFontResourceA
GetDeviceCaps
ole32
CoGetMalloc
advapi32
RegOpenKeyA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryInfoKeyA
RegEnumKeyExA
RegCreateKeyExA
AllocateAndInitializeSid
OpenProcessToken
GetTokenInformation
EqualSid
FreeSid
RegDeleteValueA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegDeleteKeyA
kernel32
lstrcatA
GetProcAddress
FindFirstFileA
RtlUnwind
GetTempPathA
HeapCreate
HeapDestroy
VirtualFree
GetStdHandle
SetHandleCount
GetFileType
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
TerminateProcess
FreeEnvironmentStringsA
LCMapStringA
HeapAlloc
LCMapStringW
ExitProcess
GetCommandLineA
HeapFree
GetModuleHandleA
RaiseException
GetStartupInfoA
LocalReAlloc
VirtualAlloc
GetOEMCP
GetACP
HeapReAlloc
GetStringTypeA
GetDriveTypeA
GetVolumeInformationA
GetSystemDefaultLCID
DebugBreak
ReleaseMutex
WideCharToMultiByte
MultiByteToWideChar
Sleep
GetCurrentProcess
CopyFileA
ReadFile
FindNextFileA
GetVersionExA
GetCPInfo
GetStringTypeW
GetFileAttributesA
GetLastError
GetModuleFileNameA
DeleteFileA
lstrlenA
CreateMutexA
SetLastError
lstrcpyA
lstrcmpiA
lstrcpynA
SetFileAttributesA
LocalAlloc
GetFullPathNameA
ExpandEnvironmentStringsA
lstrcmpA
GetPrivateProfileStringA
CloseHandle
WriteFile
SetFilePointer
CreateFileA
CreateDirectoryA
FindClose
MulDiv
InterlockedExchange
GetTimeFormatA
GetDateFormatA
OpenMutexA
GetPrivateProfileSectionA
GlobalFree
GlobalAlloc
GetSystemDefaultLangID
GetVersion
GetSystemDirectoryA
GetWindowsDirectoryA
SetCurrentDirectoryA
FreeLibrary
LoadLibraryA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetCurrentDirectoryA
IsDBCSLeadByte
LocalFree
FormatMessageA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
mpr
WNetGetConnectionA
Sections
.text Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 148KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 52KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 168KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.prdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE