Static task
static1
Behavioral task
behavioral1
Sample
07b6c824c6418a4cb97c8095c64c420448ce359be52da0db0631295856b6509e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
07b6c824c6418a4cb97c8095c64c420448ce359be52da0db0631295856b6509e.exe
Resource
win10v2004-20220812-en
General
-
Target
07b6c824c6418a4cb97c8095c64c420448ce359be52da0db0631295856b6509e
-
Size
281KB
-
MD5
5b62e39d7d4f0e5246898da01cccd6f0
-
SHA1
67ec54621fd5a742b195a9409cbe95fd55d5ddda
-
SHA256
07b6c824c6418a4cb97c8095c64c420448ce359be52da0db0631295856b6509e
-
SHA512
fedac05c329f8947ff1ff036fafa4f35ce6b9c447f8aa19b0d16983ae0bb599ee88febc8caeb8aa9d5d9a5193fa9840e9cd94983f772d3b3ffd0f7cd49fc7cbc
-
SSDEEP
6144:KsXeMUkYZkDX+ii/JvvD3b+e3tWnOahz7ms48BhvCO:pOzksk74Bv7rdOFM8f
Malware Config
Signatures
Files
-
07b6c824c6418a4cb97c8095c64c420448ce359be52da0db0631295856b6509e.exe windows x86
3ee5246d7cbc661af1605bd3be59623b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
VarUI1FromBool
VarCyRound
VarMonthName
VarCyFromI1
VarBoolFromI1
DispInvoke
VarDecFromDate
SafeArrayDestroyDescriptor
VarDateFromR4
VarCyFromI2
VarUI1FromStr
VarDecCmpR8
VarBstrFromI4
VarBoolFromR4
SafeArrayCopy
VarI2FromR4
VarI1FromCy
LPSAFEARRAY_UserFree
GetActiveObject
VarI4FromDate
user32
DrawIconEx
DlgDirSelectComboBoxExW
GetPriorityClipboardFormat
GetUserObjectInformationA
CheckRadioButton
GetWindowModuleFileNameW
SetDoubleClickTime
DdeSetQualityOfService
OpenWindowStationW
PeekMessageW
OpenInputDesktop
FlashWindow
DestroyWindow
GrayStringW
MsgWaitForMultipleObjects
msvcrt
_initterm
__setusermatherr
_adjust_fdiv
__p__fmode
__set_app_type
__getmainargs
_exit
_XcptFilter
exit
_except_handler3
__p__commode
_controlfp
__dllonexit
_onexit
_acmdln
ole32
OleCreateLinkToFile
HBITMAP_UserUnmarshal
CLIPFORMAT_UserMarshal
CoFileTimeNow
ReadFmtUserTypeStg
OleCreateLinkFromData
OleCreateFromData
STGMEDIUM_UserUnmarshal
GetConvertStg
CreateDataCache
CoLockObjectExternal
HWND_UserFree
CoTaskMemFree
HBITMAP_UserFree
gdi32
CopyMetaFileW
Pie
CreateICA
OffsetWindowOrgEx
CreateEllipticRgn
ExtCreateRegion
GetCharWidthFloatW
SaveDC
DeleteEnhMetaFile
TextOutW
GetTextCharsetInfo
kernel32
ExitProcess
GetModuleHandleA
GetStartupInfoA
shell32
SHBrowseForFolderA
SHQueryRecycleBinW
ShellExecuteA
ShellExecuteExA
Shell_NotifyIconA
SHGetSpecialFolderPathA
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ