Static task
static1
Behavioral task
behavioral1
Sample
75613ed78273333efbd51a16b80cee70235e2140c121da148b9b32fe789616f1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
75613ed78273333efbd51a16b80cee70235e2140c121da148b9b32fe789616f1.exe
Resource
win10v2004-20220812-en
General
-
Target
75613ed78273333efbd51a16b80cee70235e2140c121da148b9b32fe789616f1
-
Size
161KB
-
MD5
03e79b51cb409723f2428bf7e77543b4
-
SHA1
bddf309c07882d617147cc59437f7be29d79cd59
-
SHA256
75613ed78273333efbd51a16b80cee70235e2140c121da148b9b32fe789616f1
-
SHA512
af4ce57d6b682d80ccdd1b323cbd90d5551d72594a6a2be46c42168d436d41641a08ea2dc4af9b08d38d2070e8794624dfa2e4b0c672667528d5a8784ac0368f
-
SSDEEP
3072:BH1MYj9OafSwE7dWDRL7EPou77xbGuGvZJZgUfDMeJCdB7JT5XD+eDKS1d:BH1jMaf3udc7couhWZsOID
Malware Config
Signatures
Files
-
75613ed78273333efbd51a16b80cee70235e2140c121da148b9b32fe789616f1.exe windows x86
4159a9ccafdc9e418bec02d791aa5942
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
SetTextColor
GetStockObject
CreateFontIndirectA
DeleteObject
GetDeviceCaps
SetBkColor
SelectObject
GetTextMetricsA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
user32
CreateWindowExA
GetWindowLongA
UpdateWindow
DefWindowProcA
DispatchMessageA
MessageBoxA
CharNextA
PackDDElParam
PeekMessageA
PostMessageA
UnregisterClassA
DestroyWindow
SendMessageA
BeginPaint
CharPrevA
DrawTextA
GetClientRect
SetWindowTextA
PostQuitMessage
OffsetRect
EndPaint
ShowCursor
FindWindowA
IsWindow
MoveWindow
GetDC
GetSystemMetrics
GetMessageA
ReleaseDC
ShowWindow
SetFocus
TranslateMessage
BringWindowToTop
LoadIconA
wvsprintfA
LoadCursorA
ExitWindowsEx
LoadStringA
InvalidateRect
UnpackDDElParam
CharUpperA
wsprintfA
RegisterClassA
comdlg32
GetOpenFileNameA
advapi32
RegEnumKeyExA
SetFileSecurityA
RegCreateKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
GetFileSecurityA
RegCloseKey
RegQueryInfoKeyA
RegQueryValueExA
RegSetValueExA
OpenProcessToken
RegOpenKeyExA
ole32
CoUninitialize
OleInitialize
OleUninitialize
CoCreateInstance
CoInitialize
oleaut32
LoadTypeLi
SysAllocStringLen
VariantChangeTypeEx
VariantClear
VariantTimeToDosDateTime
RegisterTypeLi
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
VerInstallFileA
kernel32
OpenFile
GlobalFree
GlobalAlloc
SetFilePointer
GetACP
CreateFileA
LCMapStringW
LCMapStringA
GetCPInfo
VirtualAlloc
VirtualFree
GetCurrentProcessId
HeapDestroy
SetStdHandle
HeapCreate
SetHandleCount
SetEndOfFile
GetStdHandle
GetStartupInfoA
GetCommandLineA
GetLocalTime
GetSystemTime
GetCurrentDirectoryA
HeapFree
HeapAlloc
GetTimeZoneInformation
ExitProcess
FileTimeToLocalFileTime
TerminateProcess
GetFileType
FileTimeToSystemTime
GetFileAttributesA
GetVersionExA
GetVersion
HeapReAlloc
LocalFree
LocalAlloc
GetSystemDirectoryA
DosDateTimeToFileTime
GetWindowsDirectoryA
SetFileTime
GetModuleHandleA
LocalFileTimeToFileTime
SetErrorMode
LoadLibraryA
GetDriveTypeA
GetProcAddress
FreeLibrary
FlushFileBuffers
SetEnvironmentVariableA
CompareStringW
GetStringTypeW
GetStringTypeA
RtlUnwind
GetEnvironmentStringsW
GlobalAddAtomA
_lwrite
GlobalDeleteAtom
_lclose
GetFileSize
GetPrivateProfileStringA
LocalLock
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
lstrcatA
lstrcpyA
lstrlenA
lstrcmpiA
SetFileAttributesA
CopyFileA
GetModuleFileNameA
FindClose
Sleep
IsDBCSLeadByte
WriteFile
CloseHandle
FindFirstFileA
_lread
CreateProcessA
LocalUnlock
DeleteFileA
MoveFileA
GetExitCodeProcess
GetFullPathNameA
lstrcpynA
GlobalUnlock
GlobalLock
GlobalFindAtomA
GetShortPathNameA
MoveFileExA
MultiByteToWideChar
WideCharToMultiByte
CompareStringA
ReadFile
GetTempFileNameA
RemoveDirectoryA
GetLastError
CreateDirectoryA
GetTempPathA
GetCurrentProcess
Sections
.text Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE