Static task
static1
Behavioral task
behavioral1
Sample
7f8cda037233c026aa931e9b1bd8eadd4b5efe8cafc4d581c3e23b1bbcdda714.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7f8cda037233c026aa931e9b1bd8eadd4b5efe8cafc4d581c3e23b1bbcdda714.exe
Resource
win10v2004-20220812-en
General
-
Target
7f8cda037233c026aa931e9b1bd8eadd4b5efe8cafc4d581c3e23b1bbcdda714
-
Size
70KB
-
MD5
7d3564cdbebe00a7b0f7b5e16af3c3a9
-
SHA1
2d237de4d35622792fd8eeb0769ef03845af2e9d
-
SHA256
7f8cda037233c026aa931e9b1bd8eadd4b5efe8cafc4d581c3e23b1bbcdda714
-
SHA512
86d8990c460bd8ad8c52f10785bf0323c380fe5f7a8d443a85dbb053dc5498b3e2695a4cbc9c78a0bfd211cc3217bc18f9388a2fd156796a0ebd82266c897f79
-
SSDEEP
1536:zpB/plCXRzIGRnDyB2QypAPvVf19GeupnhYKn4Sou:zpRplChMGRDy3IA97GeupnhH4Sou
Malware Config
Signatures
Files
-
7f8cda037233c026aa931e9b1bd8eadd4b5efe8cafc4d581c3e23b1bbcdda714.exe windows x86
f36b46f28022ee4585e06a33f3539738
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
GetVersionExA
WaitForSingleObject
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
lstrlenW
WinExec
lstrcatA
FreeResource
GlobalFree
GlobalHandle
LockResource
LoadResource
FindResourceA
GlobalAlloc
EnterCriticalSection
GlobalLock
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
lstrcmpA
FlushInstructionCache
GetCurrentProcess
FindClose
FindFirstFileA
LeaveCriticalSection
Sleep
GetTickCount
WriteFile
MultiByteToWideChar
DeleteFileA
CreateFileA
SetFilePointer
CreateThread
ResumeThread
GetModuleHandleA
GetProcAddress
CreateMutexA
GetLastError
CloseHandle
GetTempPathA
lstrlenA
CreateDirectoryA
lstrcpyA
GlobalUnlock
CreateProcessA
GetStartupInfoA
user32
CharLowerA
PostMessageA
ShowWindow
GetWindowRect
SetWindowPos
SetWindowTextA
SetTimer
InvalidateRgn
EndDialog
GetDlgItem
EnableWindow
DefWindowProcA
DialogBoxParamA
KillTimer
InvalidateRect
SetCapture
ReleaseCapture
CreateAcceleratorTableA
GetWindowTextLengthA
GetClassNameA
RedrawWindow
GetDesktopWindow
BeginPaint
FillRect
EndPaint
CallWindowProcA
DestroyWindow
SetFocus
MessageBeep
SetDlgItemTextA
GetWindowTextA
GetDlgItemInt
SetDlgItemInt
CreateWindowExA
MessageBoxA
GetActiveWindow
GetDC
ReleaseDC
GetFocus
IsChild
GetSysColor
IsWindow
SetRect
wsprintfA
LoadStringA
CharNextA
SetWindowLongA
RegisterWindowMessageA
GetClassInfoExA
LoadCursorA
RegisterClassExA
DialogBoxIndirectParamA
GetWindowLongA
GetParent
GetWindow
GetClientRect
MapWindowPoints
SendMessageA
SystemParametersInfoA
gdi32
GetStockObject
GetObjectA
DeleteObject
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
CreateSolidBrush
GetDeviceCaps
advapi32
RegCloseKey
RegQueryValueA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteKeyA
ole32
OleLockRunning
CoTaskMemAlloc
StringFromCLSID
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoCreateGuid
CoInitialize
CoUninitialize
CoTaskMemFree
oleaut32
OleCreateFontIndirect
DispCallFunc
SysAllocString
SysStringLen
LoadRegTypeLi
SysAllocStringLen
SysFreeString
VariantClear
comctl32
InitCommonControlsEx
wininet
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetOpenA
InternetSetStatusCallback
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetSetOptionA
InternetErrorDlg
InternetQueryOptionA
InternetCloseHandle
msvcrt
strstr
??2@YAPAXI@Z
_ftol
atol
atoi
_mbsrchr
atof
_mbscmp
_mbsstr
free
wcslen
_ismbcspace
memmove
vsprintf
malloc
_ismbcdigit
_purecall
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
??3@YAXPAX@Z
shell32
ShellExecuteA
Sections
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ