Static task
static1
Behavioral task
behavioral1
Sample
77b2467c113719cdbb0c9e417fcbef8c2f98ac03e4ee82e69e7e53658102262c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
77b2467c113719cdbb0c9e417fcbef8c2f98ac03e4ee82e69e7e53658102262c.exe
Resource
win10v2004-20220812-en
General
-
Target
77b2467c113719cdbb0c9e417fcbef8c2f98ac03e4ee82e69e7e53658102262c
-
Size
96KB
-
MD5
04fcdb03da4929efed3a2ce80cc3b967
-
SHA1
7f97f98be71bb2a687c5a627a344adda36b67897
-
SHA256
77b2467c113719cdbb0c9e417fcbef8c2f98ac03e4ee82e69e7e53658102262c
-
SHA512
54f198657951258fe5f2c4393a014f3e8d12eb4da3649c4ad9a2f1809cfbae3a5d1cff46a765ee26b27d1dfbe82d55791db8d4cd25146c8e9e9f2a80428c4fee
-
SSDEEP
1536:V7FOzGO7icEIAbTZysT2g+AeyeNLUswOS6z/o/YY+RGH:V7FHV9n12VAaNOmo/RIGH
Malware Config
Signatures
Files
-
77b2467c113719cdbb0c9e417fcbef8c2f98ac03e4ee82e69e7e53658102262c.exe windows x86
640a3beb91bdc341995cc546eb32d5a2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
LocalFree
InitializeCriticalSection
TlsAlloc
DeleteCriticalSection
GlobalFree
GlobalUnlock
GlobalHandle
LeaveCriticalSection
GlobalLock
GlobalReAlloc
GlobalAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
InterlockedDecrement
lstrlenW
GetVersion
InterlockedIncrement
GetCurrentThreadId
GetModuleHandleW
lstrcpyW
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
lstrcatW
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcessVersion
lstrcpynW
lstrcmpW
GlobalFlags
GetCurrentProcess
ExitProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
HeapAlloc
HeapFree
RaiseException
RtlUnwind
HeapSize
HeapReAlloc
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetCPInfo
GetACP
GetOEMCP
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
GetStringTypeW
SetLastError
FindFirstFileW
FindNextFileW
FindClose
SystemTimeToFileTime
GetSystemDirectoryW
GetSystemTime
GetFileTime
SetFileTime
CreateDirectoryW
SetFilePointer
GetLogicalDriveStringsW
GetFileSize
MultiByteToWideChar
GetDriveTypeW
GetFileAttributesW
LoadLibraryW
GetProcAddress
GetCurrentDirectoryW
GetWindowsDirectoryW
Sleep
SetCurrentDirectoryW
CreateFileW
GetModuleFileNameW
GetLastError
CloseHandle
WriteFile
CopyFileW
SetFileAttributesW
DeleteFileW
GetWindowsDirectoryA
WinExec
FindResourceW
SizeofResource
LoadResource
LockResource
WideCharToMultiByte
GetStartupInfoW
CreateProcessW
CreateMutexW
ReleaseMutex
GetModuleFileNameA
GetFileAttributesA
lstrcmpiW
CreateThread
user32
GetClassInfoW
WinHelpW
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageW
SetWindowTextW
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameW
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutW
DrawTextW
GrayStringW
RegisterClassW
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextW
GetDlgCtrlID
DestroyWindow
SetPropW
GetPropW
CallWindowProcW
RemovePropW
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongW
SetWindowPos
RegisterWindowMessageW
SystemParametersInfoW
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapW
GetMenuState
ModifyMenuW
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
PeekMessageW
SetWindowsHookExW
LoadStringW
UnhookWindowsHookEx
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongW
MessageBoxW
EnableWindow
GetMenu
DispatchMessageW
TranslateMessage
GetMessageW
RegisterClassExW
LoadCursorW
OpenDesktopW
CloseDesktop
wsprintfW
DefWindowProcW
CreateWindowExW
LoadIconW
GetDesktopWindow
UpdateWindow
SendMessageW
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHGetPathFromIDListW
ShellExecuteA
ShellExecuteW
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoInitialize
CoUninitialize
CoTaskMemFree
CoCreateInstance
comctl32
ord17
shlwapi
PathFileExistsW
gdi32
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetStockObject
SelectObject
RestoreDC
GetClipBox
SetTextColor
SetBkColor
GetObjectW
GetDeviceCaps
DeleteObject
DeleteDC
CreateBitmap
SaveDC
winspool.drv
ClosePrinter
OpenPrinterW
DocumentPropertiesW
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ