Static task
static1
Behavioral task
behavioral1
Sample
7c9e7206453a2d6246743eab192060417a23dde30914a4f7152cf703f5a3cfdd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7c9e7206453a2d6246743eab192060417a23dde30914a4f7152cf703f5a3cfdd.exe
Resource
win10v2004-20220901-en
General
-
Target
7c9e7206453a2d6246743eab192060417a23dde30914a4f7152cf703f5a3cfdd
-
Size
228KB
-
MD5
06a28a654a4b3ecdaef9f79480660bad
-
SHA1
a6c01d82b1f7d575f4a80cd0f957f240fd5b2494
-
SHA256
7c9e7206453a2d6246743eab192060417a23dde30914a4f7152cf703f5a3cfdd
-
SHA512
6f6692042cbf32a15b65ce41a5703dd5c42d7c119db1c71167618cf3e7a677ab7839552e6cd5066c2d0833278801527873e80d1e5e3d4f2e4aa9d9b811e4dfe8
-
SSDEEP
6144:sBHPCLQ6aJbhot4T6q0KYfN3mYJ6ZlN8Vk5GSsPSpGrJo:sxkQ6aJbhot4TnfZH8Vk5GSsPSpl
Malware Config
Signatures
Files
-
7c9e7206453a2d6246743eab192060417a23dde30914a4f7152cf703f5a3cfdd.exe windows x86
04fdd45f833f2d6769f580087e7d35e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetShortPathNameA
LoadResource
FindResourceA
GetLastError
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
CreateMutexA
GetCurrentThreadId
GetCommandLineA
InitializeCriticalSection
lstrcpyA
WideCharToMultiByte
SizeofResource
CopyFileA
GetCurrentProcess
lstrlenA
MultiByteToWideChar
lstrlenW
GetWindowsDirectoryA
GetModuleHandleA
GetModuleFileNameA
GetVersionExA
GetSystemDefaultLCID
DeleteCriticalSection
lstrcatA
FreeLibrary
GetACP
FlushFileBuffers
ReadFile
SetStdHandle
SetFilePointer
IsBadCodePtr
IsBadReadPtr
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
HeapSize
TerminateProcess
LCMapStringW
LCMapStringA
GetOEMCP
GetDateFormatA
GetCPInfo
ExitProcess
GetVersion
GetStartupInfoA
RaiseException
HeapReAlloc
HeapAlloc
InterlockedDecrement
HeapFree
LoadLibraryA
GetProcAddress
GetLocaleInfoA
GetSystemDirectoryA
WriteFile
CreateFileA
GetFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
RtlUnwind
LocalFree
InterlockedIncrement
GetUserDefaultLangID
CloseHandle
user32
RegisterClassA
CallWindowProcA
wsprintfA
LoadIconA
SetForegroundWindow
FindWindowA
PostQuitMessage
EnableWindow
GetDlgCtrlID
EndDialog
GetDlgItem
SetWindowTextA
WinHelpA
LoadStringA
GetWindowRect
EnableMenuItem
GetSystemMenu
EnumChildWindows
DialogBoxParamA
GetParent
SetWindowLongA
GetMessageA
PostMessageA
DefWindowProcA
SendMessageA
CharNextA
PostThreadMessageA
DispatchMessageA
GetSystemMetrics
CreateWindowExA
EnumDisplaySettingsA
gdi32
CreateDCA
DeleteDC
GetDeviceCaps
advapi32
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyA
RegCloseKey
RegQueryValueExA
RegEnumValueA
RegEnumKeyExA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
ole32
CoTaskMemAlloc
CoTaskMemFree
CLSIDFromProgID
CoCreateInstance
CoUninitialize
CoTaskMemRealloc
CoSuspendClassObjects
CoRevokeClassObject
CoRegisterClassObject
CoInitialize
oleaut32
VarUI4FromStr
SysStringByteLen
VariantClear
SysFreeString
SysAllocString
SysAllocStringByteLen
RegisterTypeLi
SysStringLen
LoadTypeLi
comctl32
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
hccutils
GetAttachedMonitorDevice
IsDisplayValid
ReleaseClassDevice
LoadDialogString
FindDeviceByNameAndClass
GetDisplayDevice
GetCUIDriverFromClassDevice
EnumDeviceByClass
FindResources
LoadSTRING
Sections
.text Size: 96KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE