Static task
static1
Behavioral task
behavioral1
Sample
7be8025eadff8709577743bb14649524773239271c16572a40a1c03cc8dfb71a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7be8025eadff8709577743bb14649524773239271c16572a40a1c03cc8dfb71a.exe
Resource
win10v2004-20220901-en
General
-
Target
7be8025eadff8709577743bb14649524773239271c16572a40a1c03cc8dfb71a
-
Size
183KB
-
MD5
e899c844104d80f84258f0dcc557e55f
-
SHA1
9bff1af3445512eab80a47e4dd6be729f1b4f220
-
SHA256
7be8025eadff8709577743bb14649524773239271c16572a40a1c03cc8dfb71a
-
SHA512
51d7a2c4995cddfbcf9a4dffe90e563d0f14b3046fc2662c7feed645ad4d1632e3358c7021bdde8907fef76084cc22372166e075f1534b56f1918802399c50df
-
SSDEEP
3072:LXa+OuMexlOLDn78o1xS10QNu/Jo6uXP6D5vx:LXa+HxlOLT7FrsBKgPo
Malware Config
Signatures
Files
-
7be8025eadff8709577743bb14649524773239271c16572a40a1c03cc8dfb71a.exe windows x86
5b8c87c29d7cba8dd4e5327e5e9a9399
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GetCommandLineW
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableW
GetFileAttributesExW
GetFileType
GetLocaleInfoA
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetProcessWorkingSetSize
GetStartupInfoA
GetStartupInfoW
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDirectoryW
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetSystemWindowsDirectoryW
GetTickCount
GetUserDefaultLangID
GetUserDefaultUILanguage
GetVersionExA
GetVersionExW
GetVolumeInformationW
GlobalAddAtomW
HeapAlloc
HeapCompact
HeapCreate
HeapDestroy
GetCPInfo
InterlockedCompareExchange
InterlockedExchange
IsWow64Process
LCMapStringA
LCMapStringW
LoadLibraryA
LocalAlloc
LocalFree
LocalReAlloc
MapUserPhysicalPages
MultiByteToWideChar
OpenEventW
QueryPerformanceCounter
RaiseException
RtlUnwind
SearchPathW
SetCurrentDirectoryW
SetEnvironmentVariableW
SetFilePointer
SetHandleCount
SetProcessWorkingSetSize
SetStdHandle
SetThreadPriority
SetTimeZoneInformation
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcatW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrlenW
GetAtomNameW
FreeLibrary
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FormatMessageW
FlushFileBuffers
ExpandEnvironmentStringsW
ExitProcess
CreateTimerQueue
CreateThread
CreateProcessW
CompareFileTime
CloseHandle
CancelWaitableTimer
VirtualAllocEx
LoadLibraryW
GetCurrentProcessId
GetLastError
Sleep
GetModuleHandleW
HeapReAlloc
GlobalAlloc
user32
wsprintfW
SystemParametersInfoW
RegisterClassExW
MessageBoxW
LoadStringW
GetSystemMetrics
GetKeyboardLayout
GetDesktopWindow
ExitWindowsEx
DestroyWindow
DefWindowProcW
CreateWindowExW
CharNextW
GetKeyState
LoadCursorW
SendMessageW
IsWindow
gdi32
GdiGetBatchLimit
DeleteEnhMetaFile
CreatePatternBrush
CreateSolidBrush
GetColorSpace
GetLayout
advapi32
OpenProcessToken
ReportEventW
RegisterEventSourceW
RegSetValueExW
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyA
RegQueryValueExA
DeregisterEventSource
GetUserNameW
RegCloseKey
RegCreateKeyExW
RegOpenKeyExA
RegOpenKeyExW
msvcrt
_XcptFilter
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
exit
Sections
.text Size: 173KB - Virtual size: 173KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ