Static task
static1
Behavioral task
behavioral1
Sample
804b47807f9b2089ad6fe10c3882e878de425150e3fe78d9f724728b87cf9f5f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
804b47807f9b2089ad6fe10c3882e878de425150e3fe78d9f724728b87cf9f5f.exe
Resource
win10v2004-20220812-en
General
-
Target
804b47807f9b2089ad6fe10c3882e878de425150e3fe78d9f724728b87cf9f5f
-
Size
800KB
-
MD5
7e64788ca418ef44fca119048c945d4d
-
SHA1
18614424c62cdaafba3ea738f133bdde07e52cf9
-
SHA256
804b47807f9b2089ad6fe10c3882e878de425150e3fe78d9f724728b87cf9f5f
-
SHA512
65c3fa7db4b770927e7c278257e6c5218ccee90e1f36092048a221a71d87273f23f45d7e099946ff36ca8274d739ccdcb09dab01c6c8c4000f8140bd95be57d3
-
SSDEEP
12288:ilP29vhxxmkEfU/7AFLrO+VtYSV1ywPZeLepMtUD31U91sr+FVGQHvXwbDi:22pl8f+AYctYPwP2epMtUD31U9eeRvE
Malware Config
Signatures
Files
-
804b47807f9b2089ad6fe10c3882e878de425150e3fe78d9f724728b87cf9f5f.exe windows x86
d8bbdbff34e23f6034b0b1414fe32d0c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
DrawStatusTextA
ImageList_DragMove
ImageList_LoadImageA
MakeDragList
ImageList_SetBkColor
InitCommonControlsEx
ImageList_AddIcon
ImageList_GetDragImage
CreateUpDownControl
ImageList_DragEnter
ImageList_LoadImageW
ImageList_Destroy
DrawStatusText
ImageList_GetIconSize
ImageList_ReplaceIcon
ImageList_SetIconSize
ImageList_Add
ImageList_SetFilter
ImageList_DragLeave
DestroyPropertySheetPage
ImageList_Remove
ImageList_SetImageCount
ImageList_Replace
comdlg32
GetFileTitleW
PageSetupDlgA
ChooseColorW
PageSetupDlgW
kernel32
MultiByteToWideChar
GetTickCount
LeaveCriticalSection
GetTimeZoneInformation
GetProcAddress
ExitProcess
LocalFileTimeToFileTime
ResumeThread
EnterCriticalSection
GetThreadSelectorEntry
SetConsoleWindowInfo
CreateFileA
RaiseException
GetEnvironmentStrings
GetCurrentThreadId
GetACP
GetEnvironmentStringsW
IsDebuggerPresent
CompareStringA
CreateDirectoryA
AddAtomW
HeapFree
HeapReAlloc
InterlockedExchange
VirtualAlloc
GetConsoleTitleW
TlsGetValue
EnumSystemLocalesA
IsValidLocale
GlobalAlloc
GetFileType
HeapCreate
GetProcAddress
GetCurrentProcess
HeapSize
IsValidCodePage
GetModuleHandleA
WriteConsoleOutputW
QueryPerformanceCounter
WritePrivateProfileSectionA
GetDriveTypeA
GetLocaleInfoA
GetVersionExA
GetDiskFreeSpaceExA
GetStringTypeW
InterlockedDecrement
WriteConsoleW
GetConsoleCP
GetStdHandle
RtlUnwind
SetConsoleMode
WideCharToMultiByte
GetProcessHeap
GetMailslotInfo
VirtualFree
UnmapViewOfFile
GetDateFormatA
GetVersionExW
GetCPInfo
OutputDebugStringW
TlsSetValue
GetSystemTimeAsFileTime
EnumResourceLanguagesW
GetProcessHeaps
GetCurrentThread
SetConsoleCtrlHandler
GetLastError
FreeLibrary
FreeEnvironmentStringsW
CompareFileTime
OpenMutexA
CompareStringW
FlushFileBuffers
LoadLibraryExA
SetHandleCount
FileTimeToDosDateTime
TerminateProcess
CreateEventA
lstrcatA
WriteConsoleA
GetLocaleInfoW
TlsAlloc
SetCurrentDirectoryW
GlobalAddAtomW
SetStdHandle
GetModuleFileNameA
GetTimeFormatA
GetOEMCP
UnhandledExceptionFilter
GetCommandLineA
ReadFile
FreeEnvironmentStringsA
GetConsoleOutputCP
LCMapStringW
GetStartupInfoA
FindFirstFileW
WriteFile
SetEnvironmentVariableA
InitializeCriticalSection
GetCurrentProcessId
GetDateFormatW
DeleteCriticalSection
SetLastError
SetFilePointer
WritePrivateProfileStructA
HeapDestroy
GetStringTypeA
GetUserDefaultLCID
VirtualQuery
GetProfileSectionA
HeapAlloc
CloseHandle
CreateMutexA
EnumSystemCodePagesW
SetUnhandledExceptionFilter
Sleep
GetConsoleMode
TlsFree
LoadLibraryA
CreateRemoteThread
LCMapStringA
InterlockedIncrement
user32
IsCharUpperA
InvertRect
DestroyWindow
GetCapture
GetDialogBaseUnits
CascadeWindows
GetMenuStringA
DdeCreateStringHandleW
CreateWindowExW
OemToCharW
DlgDirListComboBoxW
DdeCmpStringHandles
EnumDisplaySettingsA
UnionRect
DefWindowProcW
RegisterClassExW
FindWindowW
DrawIcon
RegisterClassExA
GetWindowThreadProcessId
CharUpperBuffA
ExitWindowsEx
CheckMenuRadioItem
GetLastActivePopup
ShowWindow
CheckMenuItem
ValidateRect
MessageBoxA
SendDlgItemMessageA
ShowCursor
MonitorFromRect
RegisterClassA
SetWindowLongW
shell32
ExtractIconA
DragQueryFileAorW
SHEmptyRecycleBinW
SheChangeDirA
DragQueryFileA
gdi32
DeleteObject
SelectObject
EqualRgn
GetTextExtentPointW
CreateDCA
SetBrushOrgEx
DeleteDC
ScaleViewportExtEx
MaskBlt
GetGlyphOutline
SelectClipRgn
ResetDCA
RealizePalette
AngleArc
SetMagicColors
CreateEnhMetaFileW
CreateScalableFontResourceW
gdiPlaySpoolStream
StretchDIBits
UpdateICMRegKeyW
ExtCreatePen
GetObjectW
GetOutlineTextMetricsW
SetBoundsRect
SetWindowExtEx
Pie
SetArcDirection
GetDeviceCaps
EnumObjects
advapi32
RegDeleteValueW
LookupAccountSidA
CryptVerifySignatureA
CryptContextAddRef
CryptVerifySignatureW
CryptEnumProviderTypesW
RegDeleteKeyW
CryptSetProviderExW
RegReplaceKeyA
RegSetKeySecurity
RegQueryValueW
CryptGetUserKey
CryptSetProvParam
ReportEventA
RegEnumValueA
CryptHashSessionKey
CryptGenKey
LookupPrivilegeNameA
Sections
.text Size: 184KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 412KB - Virtual size: 408KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 140KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ