Static task
static1
Behavioral task
behavioral1
Sample
7e4311033d28572ccd4207edf41e6545eda8bc74e96ffa9f18266df9f5f9c76f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7e4311033d28572ccd4207edf41e6545eda8bc74e96ffa9f18266df9f5f9c76f.exe
Resource
win10v2004-20220901-en
General
-
Target
7e4311033d28572ccd4207edf41e6545eda8bc74e96ffa9f18266df9f5f9c76f
-
Size
50KB
-
MD5
7d34bcd36d92d51d3967d5db69c6716a
-
SHA1
f93f6f9bb24214b6e09700f4faf24ffd167697fa
-
SHA256
7e4311033d28572ccd4207edf41e6545eda8bc74e96ffa9f18266df9f5f9c76f
-
SHA512
b90b2e2f62c1e0e707477873a09cfbd7765449d39ae2536b84889bd8a77d568d0a5e123d4b595e4a7624d949e761daf5584de21e76376dc1440735d56d1082f6
-
SSDEEP
768:MrHGR35IRBon9PpNs5dGNeC++M6YkOECEq/0/TYD49J:MGR35IGppsBrkOECtmTYE9J
Malware Config
Signatures
Files
-
7e4311033d28572ccd4207edf41e6545eda8bc74e96ffa9f18266df9f5f9c76f.exe windows x86
dc6c1b2f508e9bb31b0445b6c68a1702
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
FreeSid
GetSecurityDescriptorDacl
gdi32
EnableEUDC
SetLayout
FloodFill
GetROP2
GetPixelFormat
GetCharABCWidthsA
SetLayout
CreateDIBPatternBrushPt
GdiGetBatchLimit
GetPixel
SelectObject
CancelDC
kernel32
GetCurrentProcess
ExitProcess
CreateWaitableTimerW
GetCommandLineW
GetFileInformationByHandle
GetThreadPriorityBoost
HeapSize
VirtualFree
GetTickCount
SetErrorMode
MoveFileExW
GetStartupInfoW
GetLogicalDrives
Heap32ListNext
Sleep
HeapLock
VirtualAlloc
EnumDateFormatsExW
GetModuleHandleA
FindNextFileW
msvcrt
_safe_fdivr
_mbsspn
_popen
ceil
_getdllprocaddr
_unloaddll
_except_handler3
_c_exit
_cprintf
rewind
_fgetchar
_wsystem
__threadid
user32
IsMenu
GetWindowTextA
CopyImage
GetListBoxInfo
EnumDisplaySettingsA
GetIconInfo
GetKeyboardLayoutList
GetGUIThreadInfo
ChildWindowFromPointEx
IsChild
PostThreadMessageW
SwapMouseButton
SetCaretPos
RemoveMenu
IsWindow
DdeAddData
Sections
.text Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0001 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0002 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0003 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0004 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0005 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0006 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0007 Size: 2KB - Virtual size: 10.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0008 Size: 24KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE