Static task
static1
Behavioral task
behavioral1
Sample
130ee49f02b16ea6284f685797fdee6fb23adf30d0cda48dd3225cf04bbd7567.exe
Resource
win7-20220812-en
General
-
Target
130ee49f02b16ea6284f685797fdee6fb23adf30d0cda48dd3225cf04bbd7567
-
Size
1.3MB
-
MD5
054f1b2cfb145f25e7cb531358cd5800
-
SHA1
762ffa0a3e0c926edf3768de8c879a962ea095cc
-
SHA256
130ee49f02b16ea6284f685797fdee6fb23adf30d0cda48dd3225cf04bbd7567
-
SHA512
d1f50531db188ebbbc5d80be73712a0c5cef1026610e965cee9484f48a49120f3bed3dc50a090f5bc108d916bd0b2f4ea40fa732e6def05705468bb0838d80c9
-
SSDEEP
24576:fQOmJNEIE61qZA+8O5+ygV0KE1guQuuHYhXWAIiobhBxQsMPztTcbyQQIAmd2oXJ:fQOmJNEd6SAA+y+PuuHYhXWAXobbxvsx
Malware Config
Signatures
Files
-
130ee49f02b16ea6284f685797fdee6fb23adf30d0cda48dd3225cf04bbd7567.exe windows x86
0465574baa40bbb5ede882961c1f2ddb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord823
ord540
ord537
ord4853
ord6883
ord3301
ord1771
ord6366
ord2413
ord2024
ord4219
ord2581
ord6055
ord1776
ord4401
ord5290
ord3402
ord4424
ord3639
ord692
ord567
ord2370
ord4295
ord4293
ord4061
ord4039
ord922
ord6334
ord926
ord2642
ord3092
ord609
ord802
ord2392
ord6321
ord2608
ord3550
ord4294
ord6453
ord5981
ord4538
ord2859
ord4133
ord4297
ord5788
ord2860
ord2358
ord2289
ord2575
ord4396
ord3574
ord2299
ord1146
ord1168
ord6215
ord6007
ord3998
ord535
ord6283
ord6282
ord1005
ord3286
ord939
ord2814
ord941
ord1809
ord6255
ord5945
ord5657
ord6075
ord6074
ord3494
ord3493
ord5975
ord5974
ord3167
ord3166
ord3165
ord3164
ord1744
ord2760
ord4289
ord5177
ord5178
ord310
ord2474
ord2469
ord2473
ord2476
ord2478
ord2293
ord2366
ord2294
ord2362
ord5953
ord3097
ord542
ord2301
ord4129
ord5710
ord6569
ord5601
ord2764
ord2864
ord2777
ord3499
ord2515
ord355
ord4202
ord6222
ord668
ord2770
ord356
ord1908
ord4715
ord1690
ord2528
ord5288
ord4439
ord2054
ord4431
ord771
ord497
ord4259
ord2472
ord2470
ord5683
ord2471
ord3719
ord793
ord6199
ord3810
ord3425
ord3880
ord623
ord2652
ord1973
ord2393
ord2716
ord5174
ord304
ord1669
ord5216
ord3874
ord3758
ord936
ord4216
ord1175
ord4284
ord628
ord1974
ord2083
ord309
ord1572
ord5572
ord2915
ord1770
ord831
ord853
ord1601
ord1155
ord1832
ord5651
ord350
ord3126
ord3613
ord3663
ord465
ord4160
ord861
ord1871
ord466
ord539
ord463
ord1264
ord2614
ord850
ord845
ord851
ord852
ord848
ord829
ord855
ord849
ord836
ord2141
ord5575
ord4033
ord4622
ord3579
ord614
ord290
ord4226
ord3522
ord935
ord2875
ord4278
ord918
ord830
ord6069
ord917
ord5440
ord6383
ord5450
ord6394
ord2763
ord3790
ord4224
ord6329
ord5583
ord4204
ord354
ord2841
ord2107
ord3610
ord656
ord2414
ord4275
ord2379
ord4299
ord1641
ord3619
ord3626
ord1858
ord4245
ord5101
ord2101
ord2723
ord2390
ord3059
ord5100
ord5104
ord4467
ord4303
ord3351
ord5012
ord976
ord5472
ord3403
ord2879
ord2878
ord4152
ord4077
ord5237
ord2382
ord5283
ord2649
ord1665
ord4436
ord2445
ord4427
ord527
ord401
ord674
ord794
ord5254
ord4458
ord4413
ord3349
ord3797
ord2884
ord4772
ord3742
ord818
ord2123
ord6197
ord1234
ord665
ord5645
ord1979
ord5773
ord6385
ord3507
ord6010
ord5186
ord538
ord835
ord2811
ord5442
ord3318
ord3398
ord3733
ord810
ord384
ord686
ord4271
ord2862
ord2097
ord3303
ord4125
ord3296
ord4123
ord4114
ord3815
ord3914
ord1176
ord5933
ord3302
ord6403
ord1085
ord5681
ord2582
ord4402
ord3370
ord3640
ord2411
ord2023
ord4218
ord2578
ord4398
ord3582
ord616
ord693
ord2780
ord3873
ord1765
ord4615
ord4612
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord268
ord5300
ord5302
ord4079
ord4698
ord5307
ord5714
ord3738
ord815
ord561
ord6402
ord986
ord411
ord4159
ord2621
ord1134
ord617
ord5214
ord296
ord2725
ord715
ord5289
ord3127
ord3616
ord1997
ord3511
ord5448
ord798
ord5194
ord533
ord6392
ord3054
ord1008
ord5973
ord1617
ord2153
ord2084
ord633
ord1976
ord2154
ord2407
ord5179
ord315
ord2813
ord3181
ord4058
ord2781
ord3295
ord6154
ord2530
ord4366
ord4056
ord5471
ord4121
ord2389
ord5086
ord5234
ord6369
ord5279
ord5064
ord5248
ord2444
ord3730
ord554
ord807
ord6625
ord4268
ord816
ord4023
ord2714
ord6880
ord562
ord2753
ord1126
ord2566
ord4076
ord1716
ord1718
ord1715
ord3122
ord3121
ord3157
ord3151
ord3801
ord2082
ord3800
ord3799
ord536
ord6407
ord5465
ord6223
ord4277
ord434
ord2717
ord1099
ord6073
ord467
ord4530
ord4525
ord4544
ord5685
ord3274
ord3353
ord439
ord736
ord3216
ord4042
ord3910
ord4243
ord3573
ord283
ord3293
ord938
ord5495
ord755
ord2971
ord470
ord729
ord2504
ord1706
ord430
ord5934
ord3337
ord3811
ord928
ord4448
ord4676
ord4671
ord1859
ord4246
ord3869
ord2127
ord2391
ord5102
ord5105
ord4468
ord3350
ord975
ord2880
ord4153
ord2383
ord6143
ord402
ord2152
ord6000
ord2117
ord4163
ord4457
ord5255
ord4437
ord5284
ord6828
ord4501
ord3452
ord3447
ord3196
ord5032
ord6068
ord4428
ord932
ord1834
ord4716
ord4750
ord5016
ord4375
ord4852
ord4834
ord4229
ord5919
ord3177
ord2089
ord3907
msvcrt
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
?terminate@@YAXXZ
_except_handler3
??1type_info@@UAE@XZ
_ismbcspace
_strdate
_strtime
isalnum
toupper
printf
exit
_getcwd
_mbsicmp
floor
ceil
_findfirst
sscanf
_strdup
isdigit
_ultoa
_itoa
_splitpath
strrchr
_read
_close
strtod
time
srand
rand
strtol
tolower
_CIexp
_CIlog
_CIlog10
_CIsin
_CIcos
_setmbcp
_strnicmp
_memicmp
_strupr
_strlwr
_strcmpi
_access
_tell
_lseek
_open
__CxxFrameHandler
atoi
atof
sprintf
_mbscmp
isalpha
_atoi64
_ftol
_CxxThrowException
_mbsnbicmp
_mbctype
_mbsinc
strncmp
memmove
free
malloc
_stricmp
strchr
modf
_CIpow
_CIsqrt
strncpy
qsort
__getmainargs
_CItan
kernel32
GetDiskFreeSpaceA
lstrcmpiA
GetCurrentDirectoryA
lstrcmpA
GlobalUnlock
GlobalLock
GlobalFree
IsBadWritePtr
GetCurrentThreadId
GetComputerNameA
GetWindowsDirectoryA
GetFileAttributesA
MulDiv
GetModuleHandleA
GetStartupInfoA
LoadLibraryA
GetProcAddress
FreeLibrary
CreateDirectoryA
GetModuleFileNameA
CreateMutexA
SetCurrentDirectoryA
GetLastError
lstrcatA
FindFirstFileA
RemoveDirectoryA
DeleteFileA
GetTempPathA
GetTempFileNameA
ExitProcess
lstrcpyA
GetFullPathNameA
GetPrivateProfileStringA
lstrlenA
lstrcpynA
GlobalAlloc
WinExec
CopyFileA
user32
DrawFocusRect
FillRect
RegisterClipboardFormatA
DestroyMenu
RedrawWindow
RemovePropA
WinHelpA
wsprintfA
PostMessageA
CallWindowProcA
SetFocus
GetDlgItemTextA
InflateRect
SetRect
SetCursor
SetCapture
ReleaseCapture
LoadStringA
LoadImageA
GetWindowLongA
MapWindowPoints
SetRectEmpty
SetForegroundWindow
SetActiveWindow
LoadCursorA
SetPropA
IsCharAlphaA
GetPropA
SetTimer
GetCursorPos
ScreenToClient
GetCapture
ClientToScreen
WindowFromPoint
IsChild
KillTimer
PtInRect
GetSysColor
CopyRect
GetWindowRect
GetParent
GetWindowTextA
MessageBeep
MessageBoxA
OffsetRect
GetDesktopWindow
GetWindow
SetWindowTextA
IsWindowVisible
SendMessageA
EnableWindow
UpdateWindow
InvalidateRect
LoadIconA
GetFocus
SetWindowLongA
GetDlgItem
ReleaseDC
GetDC
IsIconic
IsCharAlphaNumericA
ShowWindow
GetClientRect
GetLastActivePopup
gdi32
CreateSolidBrush
CreateHatchBrush
PolyBezier
DPtoLP
GetDeviceCaps
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
SetBrushOrgEx
PatBlt
BitBlt
CreatePen
Rectangle
CreateFontIndirectA
GetTextExtentPoint32A
GetStockObject
GetObjectA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteA
comctl32
ImageList_SetBkColor
ole32
StgOpenStorage
StgCreateDocfile
StgIsStorageFile
CoFreeUnusedLibraries
CoUninitialize
CoInitialize
CoCreateInstance
CoGetClassObject
OleRun
oleaut32
VariantClear
SysFreeString
Sections
.text Size: 932KB - Virtual size: 928KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 100KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rmnet Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE