Static task
static1
Behavioral task
behavioral1
Sample
77cb23085891ac7e3493ea6ade6ea50162a3465b95cc3aeb1c026cf3c4723dac.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
77cb23085891ac7e3493ea6ade6ea50162a3465b95cc3aeb1c026cf3c4723dac.exe
Resource
win10v2004-20220812-en
General
-
Target
77cb23085891ac7e3493ea6ade6ea50162a3465b95cc3aeb1c026cf3c4723dac
-
Size
385KB
-
MD5
0b776f8c411551a178377d4733f32080
-
SHA1
990bfa61ef5346232631382bb9312f4ee41d87f4
-
SHA256
77cb23085891ac7e3493ea6ade6ea50162a3465b95cc3aeb1c026cf3c4723dac
-
SHA512
10a40de72b54561be9730bd5b3169f753349ddc725970101298d67cf1b08b029b98a6e8eba7d818e75bc187bd0b53b3c5f4de82ccd3c6329557d6bb851e3b3a3
-
SSDEEP
6144:yq4BqZJrtolUNsjq7zFrgvDbJou5IjA8w9RG7qeHesICcG2inxZUiV9lM:NFlueBrgvD1dIU8A5eHwHHinjUii
Malware Config
Signatures
Files
-
77cb23085891ac7e3493ea6ade6ea50162a3465b95cc3aeb1c026cf3c4723dac.exe windows x86
1870f6efd8473fce73a3390b4b633ac5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetDCPenColor
GetClipRgn
GetMetaRgn
GetCurrentObject
GetDeviceCaps
GetNearestColor
GetNearestPaletteIndex
GetObjectType
GetPixelFormat
GetTextAlign
GetTextCharset
GetTextCharsetInfo
GetFontLanguageInfo
GetFontUnicodeRanges
SetSystemPaletteUse
SetTextColor
SetTextAlign
UpdateColors
user32
LoadIconA
GetWindowLongA
GetCursor
GetMenuContextHelpId
GetWindowContextHelpId
SetWindowTextA
RemovePropA
GetPropA
GetScrollPos
EndPaint
BeginPaint
GetWindowDC
GetDC
WindowFromDC
GetForegroundWindow
DrawTextA
GetMenuCheckMarkDimensions
GetMenuItemCount
GetMenuItemID
GetMenuState
GetMenu
IsWindowEnabled
EnableWindow
IsWindowUnicode
GetQueueStatus
SetFocus
CheckDlgButton
SetDlgItemTextA
GetDlgItemInt
GetDlgItem
EndDialog
MoveWindow
ShowWindow
CallWindowProcA
PostMessageA
SendMessageA
kernel32
SetEnvironmentVariableA
GetFullPathNameA
ReadConsoleW
ReadFile
SetEndOfFile
GetTimeZoneInformation
WriteConsoleW
SetFilePointerEx
SetStdHandle
CreateFileW
GetCurrentDirectoryW
SetCurrentDirectoryW
GetFullPathNameW
PeekNamedPipe
GetFileInformationByHandle
FileTimeToLocalFileTime
GetStringTypeW
OutputDebugStringW
HeapReAlloc
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetModuleFileNameA
GetConsoleMode
GetConsoleCP
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FindFirstFileExW
GetProcessHeap
DeleteFileA
FindClose
FlushFileBuffers
GetDriveTypeA
GetFileType
SetFilePointer
WriteFile
IsDebuggerPresent
CloseHandle
GetLastError
QueryPerformanceCounter
GetCurrentProcess
GetCurrentProcessId
CreateThread
GetCurrentThreadId
GetVersion
GetTickCount
GetModuleHandleA
GetProcAddress
LoadResource
LockResource
SizeofResource
GlobalAlloc
GlobalSize
GlobalHandle
FindResourceA
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
MultiByteToWideChar
WideCharToMultiByte
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
GetCommandLineA
RaiseException
RtlUnwind
IsProcessorFeaturePresent
HeapSize
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
FatalAppExitA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
GetStdHandle
GetModuleFileNameW
SetConsoleCtrlHandler
FreeLibrary
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCurrentThread
Sections
.text Size: 297KB - Virtual size: 296KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ