Static task
static1
Behavioral task
behavioral1
Sample
7aab50d132aac6d04d58886d57eab678205b6775c19172aec3cfc2231357b244.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7aab50d132aac6d04d58886d57eab678205b6775c19172aec3cfc2231357b244.exe
Resource
win10v2004-20220812-en
General
-
Target
7aab50d132aac6d04d58886d57eab678205b6775c19172aec3cfc2231357b244
-
Size
197KB
-
MD5
0d7ee5ca2ad2f1ff8dc76b0b3e46a879
-
SHA1
4fb3d2a4c3d8dd10d41f88fa406a8b57df86afd2
-
SHA256
7aab50d132aac6d04d58886d57eab678205b6775c19172aec3cfc2231357b244
-
SHA512
b2ebff2aab02fa2f0184aa7532c27c45ef0eb5c344439ab4ecb50861ebe83a5eff0c213917f0e25b967e123a3e99ea8cac8b886eaa7d2cd6c8f1aaef2ef255ff
-
SSDEEP
3072:LVHat+arJxGCKOpb+cMh0tcxW0r4MZ8NlV4OmfOcRdMj0qegl44kVS1eWDTTeGNq:ejwcMh0tcU0D+l6NfOG2Vfl442SA6
Malware Config
Signatures
Files
-
7aab50d132aac6d04d58886d57eab678205b6775c19172aec3cfc2231357b244.exe windows x86
5d8d4ff4cff8afd471244fbcc940d22c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
malloc
log10
memcpy
calloc
user32
GetActiveWindow
GetParent
GetCursor
GetMenuState
GetSysColor
GetScrollInfo
GetWindowTextA
GetMenuItemInfoA
IsWindowVisible
GetFocus
GetSubMenu
GetSysColorBrush
IsWindowEnabled
kernel32
GetTickCount
GetEnvironmentStrings
GetDiskFreeSpaceA
SetThreadLocale
FindClose
GetCPInfo
FindResourceA
SetHandleCount
Sleep
CompareStringA
GlobalAddAtomA
VirtualAllocEx
MulDiv
SizeofResource
HeapDestroy
GetStringTypeW
WideCharToMultiByte
InitializeCriticalSection
CreateThread
GetLocalTime
GetStringTypeA
WaitForSingleObject
GetLastError
FreeResource
GetFullPathNameA
SetEvent
GetSystemDefaultLangID
FreeLibrary
SetErrorMode
SetFilePointer
GetLocaleInfoA
GetFileType
GetModuleHandleA
GetCurrentThread
WriteFile
HeapAlloc
ResetEvent
LocalReAlloc
GetVersion
GetProcessHeap
GetVersionExA
EnumCalendarInfoA
VirtualFree
GetFileSize
GetCurrentProcessId
LoadResource
GetModuleFileNameA
ExitProcess
GetOEMCP
GetUserDefaultLCID
GetCommandLineA
lstrlenA
GlobalAlloc
RaiseException
GetThreadLocale
GlobalDeleteAtom
SetLastError
GetCurrentProcess
CreateEventA
lstrcpyA
DeleteFileA
GetFileAttributesA
GetStartupInfoA
lstrcpynA
LocalAlloc
CreateFileA
DeleteCriticalSection
LoadLibraryA
GetACP
HeapFree
FindFirstFileA
lstrcmpA
GetStdHandle
ReadFile
CloseHandle
LocalFree
EnterCriticalSection
VirtualQuery
VirtualAlloc
GlobalFindAtomA
GetCurrentThreadId
lstrcatA
LockResource
FormatMessageA
MoveFileExA
Sections
CODE Size: 182KB - Virtual size: 181KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 8KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE