Static task
static1
Behavioral task
behavioral1
Sample
7e35041a06a836e557b4fe5905a259c3c8e1a5ef3b27fe52ef1c783f355d7184.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7e35041a06a836e557b4fe5905a259c3c8e1a5ef3b27fe52ef1c783f355d7184.exe
Resource
win10v2004-20220812-en
General
-
Target
7e35041a06a836e557b4fe5905a259c3c8e1a5ef3b27fe52ef1c783f355d7184
-
Size
492KB
-
MD5
0bd0f35e04e42f5e2372a329eb84d3b0
-
SHA1
c45fae0117d0ad7d4f48a66072cf6cd7c0f7ff68
-
SHA256
7e35041a06a836e557b4fe5905a259c3c8e1a5ef3b27fe52ef1c783f355d7184
-
SHA512
3b8d855fb9c099ed2b5bf215f71e48e43fc5af63ed4d5105fb5b5d0a0ff5b9075ae07b796a4c0e41c17118c1e3bae4e610b3e81fac5afa4a690df03374cfccc2
-
SSDEEP
12288:P9wZGN1fTf6tT/fycm1R4u6jNUWHJuC6TnX82fI:P/nL6tT/fycm1R4uzWrIX8cI
Malware Config
Signatures
Files
-
7e35041a06a836e557b4fe5905a259c3c8e1a5ef3b27fe52ef1c783f355d7184.exe windows x86
4a271f6e980cb259a2ec1541da74f115
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
filectrl
?FileExitSys@@YAHXZ
?FileSetCtrlFlag@@YAHE@Z
?FileInitalSys@@YAHEEE@Z
?FileSetServFlag@@YAHE@Z
?FileSetUpdateAppList@@YAHXZ
?FileGetLog@@YAHPAU_FILE_LOG@@@Z
kernel32
VirtualAlloc
GetSystemInfo
VirtualQuery
RtlUnwind
ExitProcess
GetSystemTimeAsFileTime
GetDriveTypeA
TerminateProcess
GetTimeFormatA
GetDateFormatA
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapSize
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
SetStdHandle
IsBadReadPtr
IsBadCodePtr
GetUserDefaultLCID
EnumSystemLocalesA
VirtualProtect
IsValidCodePage
SetEnvironmentVariableA
GetLocaleInfoW
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
WideCharToMultiByte
GetLastError
SizeofResource
LockResource
LoadResource
FindResourceA
GetVersion
lstrcmpiA
lstrlenW
lstrlenA
CloseHandle
_lclose
CompareStringA
CompareStringW
CopyFileA
DeleteFileA
GetModuleFileNameA
CreateFileA
WaitForSingleObject
CreateThread
Sleep
CreateSemaphoreA
SetFileAttributesA
CreateDirectoryA
GetFileAttributesA
LocalFree
FormatMessageA
HeapFree
HeapAlloc
GetOEMCP
GetCPInfo
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GlobalFlags
WritePrivateProfileStringA
GetFileTime
FileTimeToLocalFileTime
SetErrorMode
lstrcatA
FileTimeToSystemTime
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GlobalAddAtomA
GetCurrentThread
GlobalDeleteAtom
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
InterlockedDecrement
GetFullPathNameA
GetVolumeInformationA
lstrcpyA
GetCurrentProcess
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
lstrcpynA
SetConsoleCtrlHandler
GetModuleHandleA
FindFirstFileA
FindClose
LoadLibraryA
GetProcAddress
FreeLibrary
GlobalMemoryStatus
GetCurrentProcessId
QueryPerformanceCounter
GetTickCount
GetStdHandle
GetFileType
GetCurrentThreadId
GetCurrentDirectoryA
GetDiskFreeSpaceA
SetFilePointer
ReadFile
WriteFile
DeviceIoControl
GetFileSize
MoveFileA
GetWindowsDirectoryA
GetSystemDirectoryA
SetCurrentDirectoryA
CreateMutexA
IsValidLocale
user32
DestroyMenu
RegisterWindowMessageA
WinHelpA
CreateWindowExA
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
LoadIconA
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
AdjustWindowRectEx
RegisterClassA
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetWindowPlacement
CopyRect
ShowWindow
SetWindowLongA
GetDlgItem
CharUpperA
MessageBoxA
GetUserObjectInformationW
GetProcessWindowStation
GetDesktopWindow
GetSubMenu
GetMenuItemCount
GetMenuItemID
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
SetWindowTextA
GetClassNameA
GetCapture
ClientToScreen
GetWindowTextA
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnregisterClassA
SetMenuItemBitmaps
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetWindowsHookExA
CallNextHookEx
GetMessageA
SetWindowPos
GetMenuState
GetSystemMetrics
wsprintfA
UnhookWindowsHookEx
PostMessageA
PostQuitMessage
SetCursor
SendMessageA
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetParent
ValidateRect
GetCursorPos
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetClassInfoA
gdi32
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetStockObject
RectVisible
PtVisible
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateBitmap
GetDeviceCaps
SelectObject
DeleteObject
DeleteDC
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegQueryValueA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
DeregisterEventSource
ReportEventA
RegisterEventSourceA
CloseServiceHandle
QueryServiceStatus
StartServiceA
OpenServiceA
OpenSCManagerA
SetServiceStatus
ChangeServiceConfig2A
CreateServiceA
RegisterServiceCtrlHandlerExA
DeleteService
ControlService
RegCreateKeyExA
RegCloseKey
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
StartServiceCtrlDispatcherA
comctl32
ord17
shlwapi
PathIsUNCA
PathFindExtensionA
PathStripToRootA
PathFindFileNameA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 288KB - Virtual size: 284KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 40KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE