Static task
static1
Behavioral task
behavioral1
Sample
7b56cf790013548ae171e29d45f09876d60895e9e9635aea1a93986170a00cda.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7b56cf790013548ae171e29d45f09876d60895e9e9635aea1a93986170a00cda.exe
Resource
win10v2004-20220812-en
General
-
Target
7b56cf790013548ae171e29d45f09876d60895e9e9635aea1a93986170a00cda
-
Size
276KB
-
MD5
1bacfd0c0aafacdede11a8fb772cce72
-
SHA1
9559295ce36e839ff72c6b500c4508042705a5cb
-
SHA256
7b56cf790013548ae171e29d45f09876d60895e9e9635aea1a93986170a00cda
-
SHA512
3cf2b10e1379f9219162113ed9d33ed1695ed9db36a9e345fae2d0bd6a083a94383c9567605914e596c84271a57f5aff2836326a3fcca60c2a25ac7934a9a16d
-
SSDEEP
3072:Iv0laNX4Ujs5Fst2PgOHcE/VPEvWm8SFDd6i:IvcaJIPgO8E/dEvx8g
Malware Config
Signatures
Files
-
7b56cf790013548ae171e29d45f09876d60895e9e9635aea1a93986170a00cda.exe windows x86
9a25d59ec0ba8214f2afd54bb92f70fc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetShortPathNameA
RtlUnwind
HeapReAlloc
RaiseException
GetStartupInfoA
GetCommandLineA
ExitProcess
TerminateProcess
HeapSize
GetACP
IsBadWritePtr
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
FlushFileBuffers
SetFilePointer
GetCurrentProcess
GetOEMCP
GetCPInfo
GetProcessVersion
GetLastError
WritePrivateProfileStringA
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
lstrcpynA
lstrlenW
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
InterlockedIncrement
SetLastError
InterlockedDecrement
FreeLibrary
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
GetModuleHandleA
GlobalUnlock
GlobalFree
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
CreateFileA
WriteFile
CloseHandle
HeapFree
Sleep
IsBadReadPtr
LoadLibraryA
GetProcAddress
VirtualFree
VirtualProtect
VirtualAlloc
GetProcessHeap
HeapAlloc
user32
PtInRect
GetSysColorBrush
LoadStringA
DestroyMenu
DestroyIcon
LoadCursorA
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
ShowWindow
SetWindowTextA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
GetClassNameA
GetTopWindow
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextA
GetDlgCtrlID
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
EndDialog
DestroyWindow
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
CopyRect
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
SetCursor
PostQuitMessage
PostMessageA
EnableWindow
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
LoadIconA
gdi32
GetDeviceCaps
PtVisible
RectVisible
TextOutA
Escape
DeleteObject
ExtTextOutA
CreateBitmap
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegQueryValueA
RegSetValueA
RegOpenKeyA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
shell32
ExtractIconA
comctl32
ord17
ole32
CoDisconnectObject
CoTaskMemFree
CoRegisterClassObject
CoTaskMemAlloc
StringFromCLSID
CoRevokeClassObject
oleaut32
LoadTypeLi
SysAllocStringByteLen
VariantCopy
VariantClear
VariantChangeType
SysAllocStringLen
SysFreeString
SysAllocString
SysStringByteLen
SysStringLen
imagehlp
MakeSureDirectoryPathExists
wininet
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
Sections
.text Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 152KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ