Static task
static1
Behavioral task
behavioral1
Sample
7da6e05649ad17c51d6bb92638a99081076d018542783c547c7c123bffa4acdd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7da6e05649ad17c51d6bb92638a99081076d018542783c547c7c123bffa4acdd.exe
Resource
win10v2004-20220812-en
General
-
Target
7da6e05649ad17c51d6bb92638a99081076d018542783c547c7c123bffa4acdd
-
Size
556KB
-
MD5
e900790c524db19b5f38457d8364066e
-
SHA1
c37babdb6510d5ca2c92890a22ff2aea50bce10d
-
SHA256
7da6e05649ad17c51d6bb92638a99081076d018542783c547c7c123bffa4acdd
-
SHA512
8619ea92811b48d54a6440c7c18363b3ea59593c953876177fec18a9119fc2db9e4fbbf3b407f05d3ea6d0e2da9472bc681e1134353d65f713a4e3c072d8f648
-
SSDEEP
12288:tpQqNX/aGasK3uNTepFbT4BpucEhu1dujLStcHqSZOEzz4aPiiDAXe:DLX//asK3uNM10pEASXSSqSZb4Wi0A
Malware Config
Signatures
Files
-
7da6e05649ad17c51d6bb92638a99081076d018542783c547c7c123bffa4acdd.exe windows x86
96084ad4ce82cf33227707c2685a0503
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetOEMCP
GetACP
CloseHandle
TryEnterCriticalSection
CreatePipe
ConnectNamedPipe
GetCurrentProcessId
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
CompareStringW
GlobalGetAtomNameW
TlsSetValue
GetTimeZoneInformation
GetVersion
CompareStringA
DeleteFileW
GetTickCount
GetProcAddress
GetCompressedFileSizeA
IsBadWritePtr
GetFileType
VirtualQuery
DeleteCriticalSection
SetEvent
GlobalHandle
FreeEnvironmentStringsA
MultiByteToWideChar
GetStringTypeA
LoadLibraryA
CreateToolhelp32Snapshot
HeapCreate
VirtualAllocEx
FreeEnvironmentStringsW
WriteFile
GetEnvironmentStringsW
GetCurrentThread
GetComputerNameA
ResetEvent
GetModuleHandleA
lstrcpynA
FlushFileBuffers
LCMapStringA
InterlockedDecrement
GetLastError
InterlockedExchange
QueryPerformanceCounter
GetLocalTime
GetStdHandle
TlsFree
GetFileTime
GetPrivateProfileSectionNamesW
GetModuleFileNameA
EnumDateFormatsExW
GetThreadPriorityBoost
WideCharToMultiByte
TlsAlloc
HeapReAlloc
GetCommandLineA
OpenSemaphoreW
OpenMutexA
InitializeCriticalSection
GetCurrentProcess
ExitThread
InterlockedIncrement
SetThreadAffinityMask
HeapAlloc
VirtualUnlock
SetLastError
GetSystemTimeAsFileTime
LocalLock
GetThreadSelectorEntry
GetSystemTime
TerminateProcess
LCMapStringW
GetCPInfo
HeapDestroy
SetFilePointer
SetStdHandle
SetThreadContext
GetProfileSectionW
GetEnvironmentStrings
SetEnvironmentVariableA
OpenWaitableTimerW
UnhandledExceptionFilter
IsValidCodePage
VirtualProtectEx
TlsGetValue
HeapFree
ReadFile
GetStartupInfoA
WaitForMultipleObjects
VirtualAlloc
SetCurrentDirectoryW
VirtualFree
ExitProcess
ReadConsoleW
SetHandleCount
CreateMutexA
RtlUnwind
GetStringTypeW
gdi32
CreateEnhMetaFileW
GetRgnBox
AbortDoc
GetTextMetricsA
Rectangle
UpdateICMRegKeyA
AddFontResourceA
UpdateICMRegKeyW
UnrealizeObject
EnumFontsA
ColorCorrectPalette
FixBrushOrgEx
StretchDIBits
TranslateCharsetInfo
CopyEnhMetaFileW
EnumMetaFile
SetPixelFormat
ExtCreateRegion
SetArcDirection
CreatePolygonRgn
GetWindowExtEx
CreateScalableFontResourceW
CreateBitmapIndirect
comdlg32
GetFileTitleW
GetFileTitleA
advapi32
RegEnumKeyA
RegEnumValueA
comctl32
ImageList_Duplicate
ImageList_GetIconSize
ImageList_ReplaceIcon
ImageList_Create
DestroyPropertySheetPage
ImageList_BeginDrag
InitCommonControlsEx
GetEffectiveClientRect
ImageList_LoadImageA
_TrackMouseEvent
ImageList_GetImageCount
ImageList_Add
CreateStatusWindow
ImageList_SetImageCount
DrawStatusTextW
ImageList_GetImageInfo
ImageList_LoadImage
CreateToolbar
CreatePropertySheetPageA
shell32
SHAddToRecentDocs
ShellExecuteW
user32
CloseClipboard
AppendMenuW
SetThreadDesktop
InflateRect
DestroyWindow
ShowWindow
DefWindowProcW
GetUserObjectSecurity
EnumPropsExW
MessageBoxW
UpdateWindow
RemovePropA
GetMenuItemInfoA
IsWindowVisible
DestroyIcon
RegisterClassExA
OpenWindowStationA
CreateWindowExA
DdeFreeDataHandle
ReleaseCapture
SetClipboardData
TranslateAcceleratorW
SetClassLongA
RegisterClassA
GetMenuCheckMarkDimensions
Sections
.text Size: 160KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 252KB - Virtual size: 251KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 133KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ