Static task
static1
Behavioral task
behavioral1
Sample
627300b1de9e8f788bf1775e1ed0881f9aacc25787748520084eb4fb1d334d05.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
627300b1de9e8f788bf1775e1ed0881f9aacc25787748520084eb4fb1d334d05.exe
Resource
win10v2004-20220901-en
General
-
Target
627300b1de9e8f788bf1775e1ed0881f9aacc25787748520084eb4fb1d334d05
-
Size
32KB
-
MD5
500c6b4b7c16aea86410aea8e2e89ef0
-
SHA1
224e6ecf95cfa9f4b39d4b329c7ac5dcd6e98df2
-
SHA256
627300b1de9e8f788bf1775e1ed0881f9aacc25787748520084eb4fb1d334d05
-
SHA512
f24d691175119a9663d4aba052a5fb54c0be4d372b2cc4f1538553905608f14fad6b2667f70feee7b154f9b7a294e69f956f1f838e9fe38db5d7c16210dec756
-
SSDEEP
768:zEaGBnmVscp44uzSecqThJRHVdnmxx25cZ2Avd:zELmVpOVThP1dmxx25cRl
Malware Config
Signatures
Files
-
627300b1de9e8f788bf1775e1ed0881f9aacc25787748520084eb4fb1d334d05.exe windows x86
12dbfc0f5c6dcf159cb21c803a5869eb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
RestoreDC
CreateRectRgn
GetObjectA
GetTextMetricsA
SetBkMode
EndDoc
DeleteDC
GetStockObject
CreateFontIndirectA
StartDocA
CreateSolidBrush
GetTextExtentPoint32A
SelectClipRgn
RectInRegion
SetTextAlign
SaveDC
DeleteObject
CreateDIBSection
CreateRectRgnIndirect
ole32
CoReleaseMarshalData
OleCreate
OleSetMenuDescriptor
OleDraw
OleFlushClipboard
OleLockRunning
OleNoteObjectVisible
OleIsCurrentClipboard
CoAddRefServerProcess
CoCreateGuid
OleGetClipboard
CoGetClassObject
OleCreateLink
OleUninitialize
CoLockObjectExternal
CoUninitialize
CoDosDateTimeToFileTime
CoFreeUnusedLibraries
OleCreateLinkEx
user32
GetWindowThreadProcessId
InvalidateRgn
ModifyMenuA
ChildWindowFromPoint
CheckRadioButton
BeginPaint
CheckDlgButton
SetFocus
IsWindowVisible
PeekMessageA
GetPropA
ReleaseDC
EnumChildWindows
EndDialog
FindWindowA
InflateRect
SendMessageTimeoutA
PostQuitMessage
ScreenToClient
LoadIconA
InsertMenuA
IsDialogMessageA
DeleteMenu
SendMessageA
DestroyIcon
AppendMenuA
DrawIconEx
GetWindowPlacement
PtInRect
GetDoubleClickTime
advapi32
CreateProcessAsUserA
RegCloseKey
LookupAccountNameA
RegDeleteKeyA
GetSecurityInfo
GetTokenInformation
GetSidSubAuthorityCount
InitializeAcl
LookupPrivilegeValueA
GetSidSubAuthority
LookupPrivilegeNameA
LookupAccountSidA
EqualSid
StartServiceA
FreeSid
RegConnectRegistryA
msvcrt
strcpy
__set_app_type
_strtime
wcsrchr
_controlfp
__mb_cur_max
ftell
_wtoi
_wcsnicmp
_wctime
fseek
_beginthread
abs
memcpy
rand
kernel32
SetEvent
TlsSetValue
FatalAppExitA
GetSystemDirectoryA
CompareStringA
GetModuleFileNameA
IsDebuggerPresent
lstrcatA
GetTimeZoneInformation
GetConsoleMode
WaitForMultipleObjects
GetPriorityClass
LocalAlloc
CloseHandle
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 968B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 455B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ