Static task
static1
Behavioral task
behavioral1
Sample
827a34e9f926bd908686c31016476a3be1e9be52951152d72d5e6af44e561bfd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
827a34e9f926bd908686c31016476a3be1e9be52951152d72d5e6af44e561bfd.exe
Resource
win10v2004-20220812-en
General
-
Target
827a34e9f926bd908686c31016476a3be1e9be52951152d72d5e6af44e561bfd
-
Size
714KB
-
MD5
962c669255d51750b01279b619a30249
-
SHA1
9f026e2fb26a51455a28e9a7c38e55b9616b2f19
-
SHA256
827a34e9f926bd908686c31016476a3be1e9be52951152d72d5e6af44e561bfd
-
SHA512
57f944f4c5fef00b5f050856797ad25610d15c4f302bb5d85d4ae65e15395d343a5c0081990872de9cace6f59ec0684a89c4358cea3b9efdffa86915a744b55d
-
SSDEEP
12288:czWiY4RcFTz0KwBmiMtOWZ3oeNtJN5lOgTgx/mdiNWMN:PU+1wBmiMtlnnDi/ciR
Malware Config
Signatures
Files
-
827a34e9f926bd908686c31016476a3be1e9be52951152d72d5e6af44e561bfd.exe windows x86
62473483961bcdac9860aa4f0b4ca93b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
ole32
OleUninitialize
OleInitialize
gdi32
SetBkColor
GetDeviceCaps
SelectObject
oleaut32
SysFreeString
SysAllocStringLen
SysStringLen
SysAllocString
version
GetFileVersionInfoSizeA
VerQueryValueA
user32
GetCursorPos
DestroyWindow
GetMessageA
GetParent
UpdateWindow
DefWindowProcA
ShowWindow
EnableWindow
TranslateMessage
GetWindow
EnableMenuItem
GetWindowLongA
CreateWindowExA
FillRect
EndPaint
MapWindowPoints
SetFocus
GetSystemMetrics
GetDC
ReleaseCapture
SetWindowLongA
SetWindowTextA
CheckMenuItem
GetSubMenu
SetTimer
GetDlgItem
LoadCursorA
LoadIconA
SetForegroundWindow
ReleaseDC
EndDialog
MoveWindow
MessageBoxA
GetSysColor
DrawTextA
GetClientRect
GetFocus
PeekMessageA
DispatchMessageA
IsWindow
SetWindowPos
GetWindowRect
kernel32
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
GetDriveTypeA
HeapDestroy
GetFileAttributesW
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetLocaleInfoA
LocalAlloc
CreateFileA
FreeEnvironmentStringsW
SetStdHandle
WideCharToMultiByte
lstrcmpiA
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
SetEvent
LocalFree
GetExitCodeProcess
InitializeCriticalSection
LoadResource
FindClose
TlsGetValue
FormatMessageA
SetLastError
GetModuleFileNameW
IsDebuggerPresent
HeapAlloc
GetVersionExA
GetModuleFileNameA
UnhandledExceptionFilter
InterlockedDecrement
MultiByteToWideChar
GetLocalTime
SetFilePointer
CreateThread
SetUnhandledExceptionFilter
GetSystemDirectoryA
TerminateProcess
WriteConsoleA
GlobalAlloc
GetConsoleMode
SetEndOfFile
InterlockedIncrement
GetLastError
GetCurrentThread
GetCommandLineA
GetCurrentThreadId
GetVersion
GetTickCount
GetCurrentProcessId
GetModuleHandleA
ExitProcess
VirtualAlloc
GetOEMCP
FindResourceA
WriteConsoleW
VirtualFree
HeapCreate
CreateProcessA
SizeofResource
GetACP
CloseHandle
ReadFile
TlsFree
MapViewOfFile
RaiseException
InterlockedCompareExchange
Sleep
HeapSize
GetCPInfo
GetCommandLineW
GetEnvironmentStrings
RemoveDirectoryA
GlobalUnlock
GetEnvironmentStringsW
FindNextFileW
LCMapStringA
GetConsoleCP
GlobalFree
lstrlenA
UnmapViewOfFile
LeaveCriticalSection
TlsSetValue
GetFileType
CreateFileW
CreateEventW
GetProcAddress
FindFirstFileW
CreateFileMappingA
GetDiskFreeSpaceA
FindFirstFileA
lstrcmpA
CompareStringW
GetProcessHeap
GetSystemInfo
GlobalLock
DeleteFileA
CreateDirectoryA
LCMapStringW
GetFileSize
GetStartupInfoA
LoadLibraryA
FlushFileBuffers
VirtualProtect
TlsAlloc
QueryPerformanceCounter
FreeLibrary
LoadLibraryW
SetHandleCount
EnterCriticalSection
HeapFree
LoadLibraryExW
Sections
.text Size: 668KB - Virtual size: 991KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ