Static task
static1
Behavioral task
behavioral1
Sample
7b2618f909ad6a5d5f11f94d2a4b93c91cf059bd3ca75026fdd59f3ef5945a00.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7b2618f909ad6a5d5f11f94d2a4b93c91cf059bd3ca75026fdd59f3ef5945a00.exe
Resource
win10v2004-20220812-en
General
-
Target
7b2618f909ad6a5d5f11f94d2a4b93c91cf059bd3ca75026fdd59f3ef5945a00
-
Size
452KB
-
MD5
735a35f229d86068acb43e550e583c20
-
SHA1
12cb874cc9a2413b2547feb2a6dd905a6610f022
-
SHA256
7b2618f909ad6a5d5f11f94d2a4b93c91cf059bd3ca75026fdd59f3ef5945a00
-
SHA512
21c1df110acdd61f9bab9b6fc6e3185489d109144c661e0bdf1952f73f5a3e5875e1b324d12182da009731334f764ead6f9a63e390ba741bc1f8bc84b6b755dd
-
SSDEEP
6144:uGe6PkzYSSuNG+N42xKphSbBKF6sQJ6fvL7Z6poi0HwLPjUIPHuCDNvuFMYbA2B8:hQYmG+NNKmW9vnZ6pjK9PaGS
Malware Config
Signatures
Files
-
7b2618f909ad6a5d5f11f94d2a4b93c91cf059bd3ca75026fdd59f3ef5945a00.exe windows x86
a61bc8ebb3c640969cf83d661caf4fa8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
hge
hgeCreate
kernel32
InitializeCriticalSection
DeleteCriticalSection
MultiByteToWideChar
GetLastError
WideCharToMultiByte
lstrlenW
lstrlenA
GlobalUnlock
GlobalLock
GlobalAlloc
GetTickCount
LeaveCriticalSection
EnterCriticalSection
IsBadReadPtr
FlushFileBuffers
CloseHandle
GetSystemInfo
RaiseException
GetTimeZoneInformation
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
WriteFile
VirtualQuery
GetStringTypeW
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
IsBadWritePtr
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
LoadLibraryA
GetProcAddress
CreateDirectoryA
Sleep
CompareStringW
VirtualProtect
SetEnvironmentVariableA
CompareStringA
SetEndOfFile
VirtualAlloc
VirtualFree
HeapCreate
ReadFile
GetLocaleInfoW
CreateFileA
SetStdHandle
GetOEMCP
SetFilePointer
HeapDestroy
HeapSize
GetCurrentProcess
TerminateProcess
HeapReAlloc
GetModuleFileNameA
InterlockedDecrement
InterlockedIncrement
RtlUnwind
ExitProcess
GetSystemTimeAsFileTime
HeapFree
GetDriveTypeA
GetCurrentDirectoryA
GetFullPathNameA
HeapAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetTimeFormatA
GetDateFormatA
LCMapStringA
LCMapStringW
GetCPInfo
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
SetUnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentProcessId
IsBadCodePtr
user32
GetActiveWindow
MoveWindow
PostMessageA
InvalidateRect
GetWindowInfo
GetCursorPos
SetCapture
ReleaseCapture
GetDC
ReleaseDC
TranslateMessage
GetClipboardData
OpenClipboard
CloseClipboard
EmptyClipboard
SetClipboardData
FlashWindow
GetWindowLongA
SetWindowLongA
GetWindowRect
gdi32
GetGlyphOutlineW
DeleteObject
DeleteDC
CreateCompatibleDC
SetMapMode
SetTextColor
SetBkColor
CreateFontA
SelectObject
GetTextMetricsA
comdlg32
ChooseColorA
shell32
ShellExecuteA
ShellExecuteW
ws2_32
WSAStartup
WSACleanup
htons
htonl
ntohl
ntohs
winmm
timeSetEvent
timeEndPeriod
timeBeginPeriod
timeGetDevCaps
timeKillEvent
Sections
.text Size: 340KB - Virtual size: 337KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ