Static task
static1
Behavioral task
behavioral1
Sample
989c9781c793e40fa9432937e662a3d906c60b53c77aa9db797335510c985a59.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
989c9781c793e40fa9432937e662a3d906c60b53c77aa9db797335510c985a59.exe
Resource
win10v2004-20220812-en
General
-
Target
989c9781c793e40fa9432937e662a3d906c60b53c77aa9db797335510c985a59
-
Size
760KB
-
MD5
755360c2cd75d27c09b8ed3340881d69
-
SHA1
d3535ae2a533dced3987e40cc167fa34ee85b760
-
SHA256
989c9781c793e40fa9432937e662a3d906c60b53c77aa9db797335510c985a59
-
SHA512
729a6c880a0d109c34b1c5ff60607f6899c6034b84ec7cc1f55a67aac9ca887a96cce92250e0cc9b6a55cd835e147e4bee923f8922f5014ed5bdca9ebdba2fc4
-
SSDEEP
12288:NV64ERCGLbJ6hLd5PvLILNDiy5RdCbjlfCsw5U53ZjwRjyVWseWwMqKcYLNDM:NVBERNEhLdJqdHCbjlfH3wRjyYLWwMq/
Malware Config
Signatures
Files
-
989c9781c793e40fa9432937e662a3d906c60b53c77aa9db797335510c985a59.exe windows x86
33367a09bcb843b1dc2307b2e78ce366
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
gdi32
SelectObject
SetTextColor
SetBkMode
DeleteDC
GetDeviceCaps
DeleteObject
kernel32
GetVersion
GetCommandLineA
GetCurrentProcessId
GetModuleHandleA
GetCurrentThread
GetLastError
GetTickCount
GetCurrentThreadId
ExitProcess
HeapAlloc
GetProcessHeap
ResetEvent
VirtualAlloc
SetConsoleCtrlHandler
Sleep
VirtualFree
UnmapViewOfFile
IsValidCodePage
CreateProcessA
SizeofResource
FindResourceA
GetModuleHandleW
GetACP
CloseHandle
ReadFile
SetFilePointer
TlsFree
RaiseException
InterlockedCompareExchange
HeapSize
WideCharToMultiByte
LockResource
GetEnvironmentStrings
lstrlenW
GlobalUnlock
GetEnvironmentStringsW
LCMapStringA
GetConsoleCP
GlobalFree
lstrlenA
GetSystemInfo
HeapCreate
LCMapStringW
LeaveCriticalSection
CreateFileA
TlsSetValue
GetFileType
CreateEventA
CreateFileW
GetTimeZoneInformation
GetModuleFileNameA
GetProcAddress
WaitForMultipleObjects
DuplicateHandle
FindFirstFileW
CreateFileMappingA
CompareStringA
FindFirstFileA
GlobalLock
DeleteFileW
SetEvent
GetWindowsDirectoryA
CreateDirectoryA
GetStartupInfoA
LoadLibraryA
GetVersionExA
TlsAlloc
QueryPerformanceCounter
FreeLibrary
LoadLibraryW
SetHandleCount
EnterCriticalSection
HeapFree
InterlockedIncrement
SetEndOfFile
GlobalAlloc
WriteConsoleA
SetUnhandledExceptionFilter
TerminateProcess
GetSystemDirectoryA
CreateThread
MultiByteToWideChar
UnhandledExceptionFilter
GetPrivateProfileStringA
LoadLibraryExA
RemoveDirectoryA
FlushFileBuffers
IsDebuggerPresent
GetModuleFileNameW
TlsGetValue
SetLastError
FormatMessageA
InterlockedDecrement
FindClose
LoadResource
LocalFree
GetOEMCP
GetStringTypeW
SetStdHandle
WriteFile
InterlockedExchange
GetSystemTimeAsFileTime
GetStringTypeA
lstrcmpiA
GetCPInfo
GetTempPathA
FreeEnvironmentStringsW
SetErrorMode
LocalAlloc
GetLocaleInfoA
GetConsoleMode
GetCurrentProcess
DeleteCriticalSection
GetFileAttributesW
HeapDestroy
WaitForSingleObject
GetFileAttributesA
GetConsoleOutputCP
GetStdHandle
oleaut32
SysAllocStringLen
VariantInit
SysAllocString
VariantClear
user32
SetCursor
CallWindowProcA
SendMessageA
SystemParametersInfoA
GetSysColor
DialogBoxParamA
MessageBoxA
SetDlgItemTextA
LoadCursorA
ScreenToClient
GetDlgItem
SetTimer
SetWindowTextA
EndDialog
PostMessageA
GetWindowRect
GetSystemMetrics
DefWindowProcA
BeginPaint
EndPaint
CreateWindowExA
GetWindowLongA
IsIconic
SetForegroundWindow
GetWindow
PeekMessageA
EnableWindow
ShowWindow
DestroyWindow
ReleaseDC
GetDC
IsWindow
SetWindowPos
PostQuitMessage
Sections
.text Size: 726KB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ