Static task
static1
Behavioral task
behavioral1
Sample
7782e236966e499a8f5c120e7af347bf326b315d38b3bd8a3e29d50db6977244.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7782e236966e499a8f5c120e7af347bf326b315d38b3bd8a3e29d50db6977244.exe
Resource
win10v2004-20220812-en
General
-
Target
7782e236966e499a8f5c120e7af347bf326b315d38b3bd8a3e29d50db6977244
-
Size
207KB
-
MD5
83cc13b4e3e0dedcfb4e2833f69e9bde
-
SHA1
804483c4c8044bef9a35e25bdbf1ccfa5429a1ef
-
SHA256
7782e236966e499a8f5c120e7af347bf326b315d38b3bd8a3e29d50db6977244
-
SHA512
d3d0be18027c36dcfaeeec7e1c8f49bf88b1ea2cb124b75770e292ed54ad8285565db32537e1d098b82414c86de65d879d0413c6afae067f4cdb38358f7288cf
-
SSDEEP
6144:6x6FU1ciicpoXuhJG8Doek8T8IBnsEUVvR:64K65cPhJxDYw8ksEUNR
Malware Config
Signatures
Files
-
7782e236966e499a8f5c120e7af347bf326b315d38b3bd8a3e29d50db6977244.exe windows x86
ff25993db4e48d85fc5d18295f3c96fd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadPriority
HeapFree
GetLocaleInfoA
SetEndOfFile
lstrcmpiW
IsBadWritePtr
CloseHandle
MultiByteToWideChar
ReadFile
InterlockedExchange
GetPrivateProfileStringW
GetFileAttributesW
GetFullPathNameW
CreateEventW
lstrcpyA
GetCurrentProcess
SetThreadPriority
GlobalUnlock
SetEvent
lstrlenW
HeapAlloc
lstrcpyW
SetLastError
lstrcmpW
GlobalHandle
GetFileSize
InterlockedIncrement
WaitForMultipleObjects
IsBadReadPtr
WideCharToMultiByte
QueryPerformanceCounter
GlobalFindAtomA
VirtualFree
GetLastError
GetCurrentProcessId
WaitForSingleObject
InitializeCriticalSection
ReleaseSemaphore
GetSystemTimeAsFileTime
GetProcessHeap
DeleteCriticalSection
lstrcpynW
LoadLibraryW
CreateFileW
GetQueuedCompletionStatus
FreeLibrary
EnterCriticalSection
GetDiskFreeSpaceW
SetUnhandledExceptionFilter
GetACP
GetVersionExW
GlobalFree
GlobalLock
GetCurrentThread
CreateSemaphoreW
GlobalAlloc
IsBadCodePtr
ResetEvent
InterlockedDecrement
WriteFile
SetFilePointer
LeaveCriticalSection
MulDiv
GetProfileIntA
lstrlenA
GetProcAddress
GlobalMemoryStatus
GetTickCount
GetModuleFileNameA
CreateThread
oleaut32
VarBstrFromI2
VarBstrFromUI4
VarBstrFromUI8
VarBstrFromUI1
VarBstrFromDec
VarBstrFromDisp
VarBstrFromI8
VarBstrFromR8
VarBstrFromI1
VarBstrFromDate
VarBstrFromR4
VarBstrFromUI2
VarBstrFromCy
VarBstrFromI4
user32
IsWindow
IsRectEmpty
SendMessageW
EnableWindow
GetWindowLongW
ShowWindow
SetDlgItemTextW
ClientToScreen
GetDlgItem
DestroyWindow
LoadCursorW
CheckRadioButton
TranslateMessage
SetDlgItemInt
IsWindowVisible
CheckDlgButton
GetDC
GetAsyncKeyState
LoadStringW
DispatchMessageW
InvalidateRect
GetClientRect
ReleaseDC
CreateDialogParamW
GetDesktopWindow
SetWindowLongW
GetDlgItemInt
SetCursor
GetWindowRect
MoveWindow
DefWindowProcW
PeekMessageW
msls31
LssbGetNumberDnodesInSubline
LssbGetVisibleDcpInSubline
LssbGetDurTrailWithPensInSubline
LssbGetObjDimSubline
LsCompressSubline
LssbGetPlsrunsFromSubline
Sections
.text Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ