Static task
static1
Behavioral task
behavioral1
Sample
b7eac044d2f6c7777bab26c20d94d0af9e576ecc4d42ec538e7192b69062ffe7.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b7eac044d2f6c7777bab26c20d94d0af9e576ecc4d42ec538e7192b69062ffe7.exe
Resource
win10v2004-20220812-en
General
-
Target
b7eac044d2f6c7777bab26c20d94d0af9e576ecc4d42ec538e7192b69062ffe7
-
Size
458KB
-
MD5
2c5047fd8359e9df541639e2c92692ac
-
SHA1
907b777741466ba1972b202c7cef58ed9f4dd52d
-
SHA256
b7eac044d2f6c7777bab26c20d94d0af9e576ecc4d42ec538e7192b69062ffe7
-
SHA512
14e98072efed7249e941830e8b5d7e63b5ba218aa01487d4be68b522944c816660034099802f719f8cc75583fc683b466691f49d422b2980c3ab5fc24ca3f983
-
SSDEEP
12288:sVdbbjlfPtyloRHlL4T4kIUF+JfTFnFp26WQ:sfb/l3AaRHlUsTDp265
Malware Config
Signatures
Files
-
b7eac044d2f6c7777bab26c20d94d0af9e576ecc4d42ec538e7192b69062ffe7.exe windows x86
0d7997a39f3946056cf332ecfe9a0b85
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SizeofResource
SetStdHandle
GetModuleHandleW
GlobalLock
GetACP
FindNextFileW
ReadFile
SetFilePointer
TlsFree
MapViewOfFile
RaiseException
IsBadReadPtr
InterlockedCompareExchange
GetCommandLineA
HeapSize
WideCharToMultiByte
GetCommandLineW
LockResource
GetCurrentProcessId
WritePrivateProfileStringA
GetEnvironmentStrings
RemoveDirectoryA
VirtualQuery
GlobalUnlock
GetEnvironmentStringsW
LCMapStringA
FindResourceW
GetConsoleCP
GlobalFree
lstrlenA
GetSystemInfo
UnmapViewOfFile
LCMapStringW
GetLastError
LeaveCriticalSection
ExitProcess
TlsSetValue
GetFileType
CreateEventA
CreateFileW
Sleep
WaitForMultipleObjects
DuplicateHandle
FindFirstFileW
CreateFileMappingA
GetCurrentThreadId
FindFirstFileA
CompareStringW
GetProcessHeap
GetProcAddress
GetFullPathNameA
SetEvent
GetWindowsDirectoryA
DeleteFileA
CreateDirectoryA
GetFileSize
GetStartupInfoA
LoadLibraryA
GetVersionExA
VirtualProtect
TlsAlloc
GetTickCount
QueryPerformanceCounter
FreeLibrary
LoadLibraryW
SetHandleCount
CreateProcessA
HeapFree
CloseHandle
LoadLibraryExW
InterlockedIncrement
GetVersion
SetEndOfFile
GlobalAlloc
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
MulDiv
SetUnhandledExceptionFilter
CreateThread
GetModuleHandleA
GetLocalTime
MultiByteToWideChar
TlsGetValue
UnhandledExceptionFilter
LoadLibraryExA
GetModuleFileNameA
InterlockedExchange
FlushFileBuffers
HeapAlloc
IsDebuggerPresent
GetModuleFileNameW
lstrlenW
SetLastError
FormatMessageA
InterlockedDecrement
FindClose
LoadResource
InitializeCriticalSection
GetExitCodeProcess
FormatMessageW
LocalFree
GetOEMCP
SetFileAttributesA
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
GetStringTypeA
lstrcmpiA
GetCPInfo
GetTempPathA
GetLocaleInfoW
FreeEnvironmentStringsW
SetErrorMode
CreateFileA
lstrcatA
LocalAlloc
GetLocaleInfoA
GetConsoleMode
GetCurrentDirectoryA
GetCurrentProcess
DeleteCriticalSection
FreeEnvironmentStringsA
GetFileAttributesW
HeapDestroy
FindNextFileA
GetDriveTypeA
WaitForSingleObject
GetFileAttributesA
FileTimeToSystemTime
ReleaseMutex
GetConsoleOutputCP
GetStdHandle
HeapCreate
WriteFile
VirtualFree
WriteConsoleW
FindResourceA
VirtualAlloc
EnterCriticalSection
DeleteFileW
oleaut32
SysAllocString
VariantInit
SysFreeString
SysAllocStringLen
SysStringLen
VariantClear
gdi32
SelectObject
GetStockObject
DeleteDC
DeleteObject
BitBlt
SetBkColor
SetTextColor
user32
SetCursor
GetFocus
wsprintfA
InvalidateRect
SystemParametersInfoA
GetSysColor
DialogBoxParamA
MessageBoxA
SetForegroundWindow
GetDesktopWindow
TrackPopupMenu
LoadIconA
LoadCursorA
ScreenToClient
GetDlgItem
CreateWindowExA
SetWindowTextA
SetWindowLongA
ReleaseCapture
PostMessageA
IsIconic
GetWindowRect
GetSystemMetrics
BeginPaint
ClientToScreen
SetFocus
EndPaint
DispatchMessageA
FillRect
SetTimer
GetWindowLongA
EnableMenuItem
GetWindow
IsWindowEnabled
EnableWindow
ShowWindow
DefWindowProcA
UpdateWindow
GetParent
GetMessageA
DestroyWindow
GetActiveWindow
GetClientRect
SendMessageA
TranslateMessage
ReleaseDC
GetCursorPos
GetDC
IsWindow
SetWindowPos
PostQuitMessage
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 430KB - Virtual size: 429KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 752B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ