Static task
static1
Behavioral task
behavioral1
Sample
982dc2d210ba0be3316dae534b971cfefc842eff66640c3f49f2e47653a239f7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
982dc2d210ba0be3316dae534b971cfefc842eff66640c3f49f2e47653a239f7.exe
Resource
win10v2004-20220901-en
General
-
Target
982dc2d210ba0be3316dae534b971cfefc842eff66640c3f49f2e47653a239f7
-
Size
210KB
-
MD5
71453f7beba423478107cbe850b4e5c0
-
SHA1
4c5ee9733d669b5140b811b0a07b6ba1afd37102
-
SHA256
982dc2d210ba0be3316dae534b971cfefc842eff66640c3f49f2e47653a239f7
-
SHA512
d6d6d7c8ee3e1926eaa95d561fb8212a4ebaa612bfe8371479b0a042da59e4b12f41d4c270226a30ecf2eef328b3435c81d397662cc767be90d0f625e8f247d6
-
SSDEEP
3072:orD0Cse1u7QnWcNK+84Qghc9xzWSoj5v:Oj4x14jAxSP5
Malware Config
Signatures
Files
-
982dc2d210ba0be3316dae534b971cfefc842eff66640c3f49f2e47653a239f7.exe windows x86
02cb89faa010d032d4835af9e6fb965a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
FindNextFileA
GetLogicalDriveStringsA
GetOEMCP
EnumSystemCodePagesA
SetEndOfFile
SetStdHandle
LoadLibraryA
GetProcAddress
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetTempPathA
SetFilePointer
GetFileType
GetStdHandle
DeleteFileA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsGetValue
TlsAlloc
GetACP
GetCPInfo
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
SetFileAttributesA
GetModuleFileNameA
FindFirstFileA
FindClose
CopyFileA
FlushFileBuffers
GetLastError
LCMapStringW
LCMapStringA
GetFileAttributesA
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
SetLastError
FindResourceExA
LoadResource
GetTickCount
WriteFile
GetModuleHandleA
GetSystemTimeAsFileTime
SystemTimeToFileTime
CreateFileA
GetFileSize
CloseHandle
ReadFile
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
WideCharToMultiByte
SetHandleCount
InterlockedDecrement
InterlockedIncrement
HeapAlloc
HeapFree
CreateThread
GetCurrentThreadId
TlsSetValue
ExitThread
RtlUnwind
HeapReAlloc
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
InitializeCriticalSection
user32
PostQuitMessage
DefWindowProcA
SetWindowTextA
CreateWindowExA
MapWindowPoints
CreateDialogParamA
IsWindowEnabled
SetFocus
GetNextDlgTabItem
LoadIconA
RegisterClassExA
GetWindowLongA
GetMessageA
TranslateMessage
DispatchMessageA
IsDialogMessageA
DialogBoxParamA
MessageBoxA
GetSystemMetrics
SetWindowPos
ShowWindow
IsDlgButtonChecked
CheckDlgButton
EndDialog
GetParent
GetWindowRect
MoveWindow
SetDlgItemTextA
SendMessageA
GetDlgItem
GetDlgItemTextA
EnableWindow
PostMessageA
GetSysColorBrush
GetSysColor
SetWindowLongA
ChildWindowFromPoint
InvalidateRect
LoadCursorA
SetCursor
gdi32
GetObjectA
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
GetStockObject
comdlg32
GetOpenFileNameA
advapi32
CryptHashData
CryptDestroyKey
RegCreateKeyA
RegQueryValueExA
RegEnumValueA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
CryptAcquireContextA
CryptImportKey
CryptCreateHash
CryptVerifySignatureA
CryptDestroyHash
CryptReleaseContext
shell32
SHBrowseForFolderA
SHGetMalloc
SHGetPathFromIDListA
ShellExecuteA
comctl32
ord17
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE