Static task
static1
Behavioral task
behavioral1
Sample
7bec889177388b285b4e6079837a29c33e2c77178c586897a84c60002e0ded6e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7bec889177388b285b4e6079837a29c33e2c77178c586897a84c60002e0ded6e.exe
Resource
win10v2004-20220812-en
General
-
Target
7bec889177388b285b4e6079837a29c33e2c77178c586897a84c60002e0ded6e
-
Size
176KB
-
MD5
83b96d1853f5b2fc8e08e2eaaa1d6c21
-
SHA1
c292e58d705b44dcf53906a57432cc2e1f2f7db8
-
SHA256
7bec889177388b285b4e6079837a29c33e2c77178c586897a84c60002e0ded6e
-
SHA512
f7736c8f10e0fcd6d505bc3988fdf5a05ef2569ab228d25998474beab5256c096681cd6e4a7081fff0bacc7d5f993a97f9aea6f18911c81d2353caea7b977302
-
SSDEEP
3072:qd8VunvgLjfma2eZN1mlcbXNelxvseOV2CBQJyt:Run4LjfmaNVicbXYOAJ
Malware Config
Signatures
Files
-
7bec889177388b285b4e6079837a29c33e2c77178c586897a84c60002e0ded6e.exe windows x86
1b12afc37c965f904e53eae1641e7917
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEvent
OpenEventA
MultiByteToWideChar
lstrlenW
RaiseException
InitializeCriticalSection
DeleteCriticalSection
GetLastError
lstrlenA
WaitForSingleObject
CreateThread
CreateEventA
InterlockedIncrement
lstrcpynA
lstrcpyA
GetModuleFileNameA
lstrcatA
IsDBCSLeadByte
CloseHandle
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
Sleep
CreateMutexA
GetCurrentThreadId
GetCommandLineA
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FlushFileBuffers
SetStdHandle
SetFilePointer
ReadFile
InterlockedDecrement
WideCharToMultiByte
lstrcmpiA
GetModuleHandleA
GetProcAddress
GetVersionExA
GetThreadLocale
InterlockedExchange
GetLocaleInfoA
GetACP
FreeLibrary
GetStringTypeW
GetStringTypeA
GetCPInfo
GetOEMCP
LoadLibraryA
LCMapStringW
FreeEnvironmentStringsW
LCMapStringA
IsBadCodePtr
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
WriteFile
HeapSize
GetCurrentProcess
IsBadReadPtr
GetSystemTimeAsFileTime
LocalFree
HeapAlloc
RtlUnwind
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
GetStartupInfoA
ExitProcess
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentProcessId
user32
PostThreadMessageA
DefWindowProcA
DispatchMessageA
GetMessageA
CreateWindowExA
RegisterClassA
CharNextA
advapi32
RegSetValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
IsTextUnicode
ole32
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
StringFromGUID2
CoInitialize
CoCreateInstance
CoUninitialize
oleaut32
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysFreeString
SysAllocString
VariantClear
shlwapi
PathFindExtensionA
Sections
.text Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ