Static task
static1
Behavioral task
behavioral1
Sample
7023197fde583ea24d2ce6f72fb7b36e674c839160f34cdc6216a92634a168d1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7023197fde583ea24d2ce6f72fb7b36e674c839160f34cdc6216a92634a168d1.exe
Resource
win10v2004-20220812-en
General
-
Target
7023197fde583ea24d2ce6f72fb7b36e674c839160f34cdc6216a92634a168d1
-
Size
83KB
-
MD5
552a5b93769c3b558f826d3259aa78f0
-
SHA1
7ebbb00243b85195ce36d525338d34a2c6efa889
-
SHA256
7023197fde583ea24d2ce6f72fb7b36e674c839160f34cdc6216a92634a168d1
-
SHA512
d9f3ea3f9aa2c070112f82f4163d189e125389665bc49b6818527da7792e2346df8b2e342798f7b0f92a9fd03a3b7bfb086f429d1e01cbff9fe876a3a5953838
-
SSDEEP
1536:bfEIfsBPgNmvLVzdst7NEkIKxCDB0gYw5nCuGnsXGGGWJS:bsIEN9vleYkIKxuBd7OsJGGS
Malware Config
Signatures
Files
-
7023197fde583ea24d2ce6f72fb7b36e674c839160f34cdc6216a92634a168d1.exe windows x86
bbf51276b79c1a5fa9e7d1a5ae7d9526
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
GetSubMenu
EnumWindows
EqualRect
SetWindowPos
PostQuitMessage
FrameRect
SetWindowTextA
GetScrollPos
GetMessageA
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
EnableMenuItem
kernel32
SetUnhandledExceptionFilter
RtlUnwind
ExitProcess
FileTimeToSystemTime
GetTimeZoneInformation
GetThreadLocale
GetTempPathA
QueryPerformanceCounter
GetStartupInfoA
InterlockedExchange
GetCurrentProcessId
GetTickCount
GetFileAttributesA
GetSystemTime
VirtualAllocEx
GetACP
gdi32
SelectClipPath
GetMapMode
DPtoLP
FillRgn
CreateICW
ExcludeClipRect
CopyEnhMetaFileA
CreateCompatibleBitmap
SetViewportExtEx
ole32
CoRevokeClassObject
StringFromGUID2
DoDragDrop
CoTaskMemRealloc
CoInitialize
StgOpenStorage
OleRun
CoCreateInstance
CoInitializeSecurity
advapi32
RegQueryValueExW
CheckTokenMembership
RegCreateKeyExW
CryptHashData
RegCreateKeyA
AdjustTokenPrivileges
FreeSid
GetUserNameA
QueryServiceStatus
GetSecurityDescriptorDacl
msvcrt
puts
_flsbuf
__initenv
_fdopen
strncpy
fprintf
__setusermatherr
_lock
iswspace
fflush
_strdup
signal
_mbscmp
strlen
_CIpow
raise
strcspn
__getmainargs
comctl32
ImageList_GetBkColor
ImageList_Write
ImageList_ReplaceIcon
InitCommonControls
ImageList_LoadImageA
CreatePropertySheetPageA
ImageList_GetIcon
ImageList_LoadImageW
ImageList_DrawEx
ImageList_SetIconSize
ImageList_Destroy
ImageList_GetIconSize
ImageList_DragEnter
shell32
SHGetPathFromIDList
DragAcceptFiles
CommandLineToArgvW
ExtractIconW
DragQueryFileA
DoEnvironmentSubstW
ExtractIconExW
SHBrowseForFolderA
ShellExecuteW
ShellExecuteEx
DragQueryFileW
oleaut32
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayRedim
SysReAllocStringLen
SafeArrayCreate
VariantCopy
SafeArrayGetUBound
SafeArrayUnaccessData
Sections
.text Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ynzqaon Size: - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dchfwon Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE