Static task
static1
Behavioral task
behavioral1
Sample
7b24a0d9f66a216435226725754f79d4b551c516bdd125634a9fff6a15334a9a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7b24a0d9f66a216435226725754f79d4b551c516bdd125634a9fff6a15334a9a.exe
Resource
win10v2004-20220812-en
General
-
Target
7b24a0d9f66a216435226725754f79d4b551c516bdd125634a9fff6a15334a9a
-
Size
260KB
-
MD5
5342cb514a2858d8bd68d32c72ab03ea
-
SHA1
d71bdf3e8f0a5b9ebb1611395a7a6f33437c8e53
-
SHA256
7b24a0d9f66a216435226725754f79d4b551c516bdd125634a9fff6a15334a9a
-
SHA512
0bd03004673ea7a5defd3748e0819e26786ffbf2afca2e59d4a517c252ff0c486c7a830a506a98c3d4f2c69e779dd697a943453f5e77290ef8d8bb2ce2184e9b
-
SSDEEP
6144:IHEvAtP3umQdFpHDXDgctxSbyb6KteLgE6pTi768WO:YEvqP3upFpbDMKrFdTi7dWO
Malware Config
Signatures
Files
-
7b24a0d9f66a216435226725754f79d4b551c516bdd125634a9fff6a15334a9a.exe windows x86
700a8cb34493e01714b52c668a7af637
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsRectEmpty
MessageBoxW
IsClipboardFormatAvailable
DestroyIcon
IsChild
InsertMenuW
SendDlgItemMessageA
InvalidateRgn
SetWindowPlacement
MoveWindow
GetSystemMetrics
SetRect
RegisterClassExW
GetWindowTextW
CreatePopupMenu
GetScrollInfo
CreateDialogIndirectParamW
GetDlgItem
DrawTextExW
DefWindowProcW
DestroyAcceleratorTable
GetKeyState
SetFocus
GetActiveWindow
LoadStringW
DestroyMenu
CallNextHookEx
GetSysColor
GetParent
UpdateWindow
SetParent
WindowFromPoint
SetWindowLongW
DrawFrameControl
PtInRect
LoadIconW
CreateWindowExW
KillTimer
AttachThreadInput
IsZoomed
SetCursor
FillRect
DestroyWindow
ScreenToClient
SetWindowPos
SystemParametersInfoW
GetClipboardData
PostMessageW
SetDlgItemTextW
GetDlgCtrlID
CloseClipboard
GetWindowRect
ShowWindow
LoadBitmapW
SetScrollInfo
InflateRect
SetCapture
DestroyCursor
LoadCursorW
ClientToScreen
SystemParametersInfoA
RegisterClassW
SetTimer
LoadAcceleratorsW
advapi32
RegQueryValueExW
RegCreateKeyExW
RegDeleteValueA
RegSetValueExW
OpenProcessToken
RegCreateKeyExA
RegSetValueExA
RegFlushKey
RegOpenKeyExA
RegDeleteKeyW
RegQueryValueW
RegOpenKeyExW
RegCloseKey
RegQueryValueExA
GetTokenInformation
kernel32
FlushFileBuffers
GetUserDefaultLCID
InterlockedExchange
lstrcpynW
GetModuleHandleW
SetEndOfFile
GetTimeFormatA
LockResource
GetModuleHandleA
WriteFile
VirtualAlloc
DeleteFileW
GetCurrentDirectoryA
lstrlenW
UnlockFile
FreeLibrary
SystemTimeToFileTime
ConvertDefaultLocale
UnhandledExceptionFilter
ReadFile
VirtualProtect
VirtualQuery
GlobalHandle
GetEnvironmentVariableW
LoadLibraryA
WriteConsoleA
GetCommandLineW
CreateProcessW
FindFirstFileW
GlobalLock
InitializeCriticalSection
CreateFileW
GlobalSize
GetEnvironmentStrings
HeapDestroy
ExitThread
IsBadWritePtr
MulDiv
LeaveCriticalSection
GetVersion
GetTickCount
GetUserDefaultLangID
SetFileTime
GetCurrentProcess
FileTimeToSystemTime
InterlockedIncrement
CreateEventW
SetThreadPriority
InterlockedDecrement
RaiseException
FileTimeToLocalFileTime
GetFileTime
GetStartupInfoA
RtlUnwind
FindClose
WideCharToMultiByte
CompareStringW
GetProcessHeap
SizeofResource
GetCurrentDirectoryW
WaitForSingleObject
lstrlenA
GetOEMCP
lstrcmpW
GlobalUnlock
FindNextFileW
LCMapStringA
GetLastError
CopyFileW
EnterCriticalSection
DeviceIoControl
LoadResource
GetModuleFileNameA
GetSystemTimeAsFileTime
GlobalFlags
LocalFileTimeToFileTime
lstrcatW
DeleteCriticalSection
GlobalDeleteAtom
MultiByteToWideChar
GetCommandLineA
GetLocaleInfoW
GetLocaleInfoA
IsDebuggerPresent
CloseHandle
HeapCreate
GetTimeZoneInformation
GetStringTypeA
FormatMessageW
SetLastError
SetUnhandledExceptionFilter
HeapAlloc
GetStringTypeW
lstrcmpiA
GetSystemTime
GetLocalTime
Sleep
SetFileAttributesW
LockFile
lstrcmpA
GlobalAlloc
CreateThread
GetSystemInfo
HeapReAlloc
HeapSize
ResetEvent
IsBadReadPtr
GetTempFileNameW
QueryPerformanceCounter
LocalFree
GetFullPathNameW
GetVersionExA
OpenProcess
GetDriveTypeA
GetWindowsDirectoryW
InterlockedCompareExchange
SetHandleCount
HeapFree
VirtualFree
TlsSetValue
GetDateFormatA
CreateMutexW
FreeResource
GetExitCodeProcess
TlsGetValue
SetEvent
GetThreadLocale
LocalAlloc
CreateDirectoryW
LoadLibraryW
LoadLibraryExW
GetModuleFileNameW
GetStdHandle
ResumeThread
TlsAlloc
GetFileAttributesA
IsBadCodePtr
CompareStringA
TerminateThread
SetStdHandle
UnmapViewOfFile
LocalReAlloc
FreeEnvironmentStringsW
lstrcmpiW
IsValidLocale
GetTempPathW
ReleaseMutex
SetFilePointer
GetVersionExW
GetFileType
GetTempPathA
GetFileAttributesW
CreateFileA
GetCurrentProcessId
GetCurrentThread
GetStartupInfoW
SetErrorMode
SetEnvironmentVariableA
lstrcpyW
DuplicateHandle
GetCurrentThreadId
ExitProcess
TlsFree
GetVolumeInformationW
TerminateProcess
GetFileSize
GlobalFree
FreeEnvironmentStringsA
WinExec
LCMapStringW
GetCPInfo
GetEnvironmentStringsW
GetACP
GetProcAddress
shell32
SHChangeNotify
DragQueryFileA
SHGetSpecialFolderLocation
ShellExecuteA
ole32
OleUninitialize
StgCreateDocfileOnILockBytes
CoGetClassObject
CLSIDFromString
OleGetClipboard
OleSetClipboard
OleInitialize
OleFlushClipboard
CoInitialize
CoTaskMemAlloc
CreateILockBytesOnHGlobal
ReleaseStgMedium
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ