Static task
static1
Behavioral task
behavioral1
Sample
7872c3548092520582d1512e4ed4abf8740e742f4cec1e5417249537e0dcc269.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7872c3548092520582d1512e4ed4abf8740e742f4cec1e5417249537e0dcc269.exe
Resource
win10v2004-20220901-en
General
-
Target
7872c3548092520582d1512e4ed4abf8740e742f4cec1e5417249537e0dcc269
-
Size
404KB
-
MD5
0774dcec8e5a4eccbedffb724062853a
-
SHA1
31b437e84634a9168a57391c8b01d1da8a063c13
-
SHA256
7872c3548092520582d1512e4ed4abf8740e742f4cec1e5417249537e0dcc269
-
SHA512
9e301d986d7ad9251d7d2d5b0f95f060e21fd26753e927a028965a5e7c4eb8a7756578991af1d029dce7249449da65627ed474aa19539872f77769eec58281e0
-
SSDEEP
6144:gqQRt3yM188JtQsHaN4Db+yv76zLXp27G99DtABBSuUGEzN:gpL3yMlzzai286Ps7GjDtUSxGs
Malware Config
Signatures
Files
-
7872c3548092520582d1512e4ed4abf8740e742f4cec1e5417249537e0dcc269.exe windows x86
0c541264c72ad0d5a22413fde90a4b4d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EnumPropsA
SetSysColors
UnregisterHotKey
CharNextExA
SetRect
GetInputDesktop
SetUserObjectInformationW
SetMessageQueue
CharNextA
GetComboBoxInfo
GetMessagePos
SetDlgItemTextA
RegisterClassA
ReleaseCapture
PostMessageW
DlgDirSelectExA
OemToCharA
CallNextHookEx
RedrawWindow
SubtractRect
CopyAcceleratorTableW
GetTabbedTextExtentA
DlgDirSelectComboBoxExA
EqualRect
WINNLSEnableIME
GetMenuBarInfo
GetUserObjectInformationA
LoadCursorA
EnumDisplaySettingsA
SetMenuDefaultItem
CreateIconFromResource
InvertRect
SystemParametersInfoA
SendMessageTimeoutA
DdeKeepStringHandle
SwapMouseButton
IsMenu
DrawFocusRect
DdeQueryStringW
EnumChildWindows
MessageBoxW
TabbedTextOutA
RegisterClassExA
GetSystemMenu
OffsetRect
WinHelpW
GetMenuItemInfoW
ScreenToClient
GetMonitorInfoW
DdeGetData
ModifyMenuW
SendMessageW
CreateAcceleratorTableA
FindWindowExA
GetGUIThreadInfo
CreateDesktopW
SetMenuItemInfoA
CreateDialogIndirectParamA
GetDlgItemTextW
DestroyWindow
ArrangeIconicWindows
RegisterHotKey
CreateCaret
SwitchToThisWindow
GetShellWindow
CharPrevA
UnloadKeyboardLayout
wvsprintfA
DrawMenuBar
DdeFreeDataHandle
IsCharAlphaNumericA
SetWindowPlacement
GetClipboardOwner
DdeClientTransaction
GetProcessDefaultLayout
GetMenuContextHelpId
GetMenuInfo
DestroyCursor
GetScrollBarInfo
DefWindowProcW
GetSubMenu
EnumDisplaySettingsExW
UnregisterClassA
WINNLSGetIMEHotkey
ShowWindow
SetParent
DdeCreateStringHandleW
SetUserObjectInformationA
RegisterClassExW
CharLowerBuffA
GetSysColor
EnumWindowStationsA
VkKeyScanA
MonitorFromPoint
DefMDIChildProcA
SetWindowTextA
CallMsgFilterA
GetFocus
UnregisterDeviceNotification
CreateWindowExA
comctl32
ImageList_Read
ImageList_SetFilter
ImageList_DrawEx
ImageList_EndDrag
ImageList_DragEnter
ImageList_LoadImage
ImageList_BeginDrag
ImageList_Add
ImageList_GetIconSize
ImageList_GetDragImage
CreatePropertySheetPageW
ImageList_DragMove
ImageList_DragShowNolock
ImageList_AddIcon
CreateUpDownControl
InitCommonControlsEx
ImageList_Duplicate
kernel32
CloseHandle
SetEnvironmentVariableA
GetTempFileNameW
FreeLibrary
GetDiskFreeSpaceW
SetCriticalSectionSpinCount
WaitNamedPipeA
GetCalendarInfoW
TlsAlloc
GetStdHandle
OpenProcess
FindFirstFileW
LocalLock
HeapSize
FreeEnvironmentStringsW
GetDateFormatA
CompareStringA
VirtualQuery
GetCurrentThreadId
LCMapStringW
GetEnvironmentStringsW
OpenMutexA
CreateRemoteThread
SetFilePointer
QueryPerformanceCounter
TlsGetValue
InterlockedDecrement
ReadConsoleW
ReadFile
GetOEMCP
SetUnhandledExceptionFilter
RtlUnwind
SetConsoleCtrlHandler
GetConsoleMode
HeapAlloc
GetSystemTimeAsFileTime
OpenFileMappingW
VirtualAlloc
GetModuleHandleA
MoveFileA
FlushFileBuffers
GetProcAddress
WideCharToMultiByte
InterlockedExchange
CreateFileA
GetCommandLineA
SetLastError
GetLastError
TlsSetValue
LCMapStringA
OpenWaitableTimerA
FileTimeToSystemTime
GetCurrentProcessId
GetCurrentProcess
GetFileType
IsDebuggerPresent
HeapDestroy
GetTimeFormatA
OpenSemaphoreA
WriteProfileStringW
FreeEnvironmentStringsA
GetCPInfo
WriteConsoleW
GetConsoleOutputCP
WritePrivateProfileStructA
TlsFree
TerminateProcess
DebugBreak
SetStdHandle
UnlockFileEx
IsValidCodePage
SetEvent
LoadLibraryA
OutputDebugStringW
GetDriveTypeW
HeapReAlloc
GetACP
WriteFile
GetLocaleInfoA
InitializeCriticalSection
WriteConsoleA
CreateMutexA
HeapFree
LeaveCriticalSection
InterlockedCompareExchange
ConnectNamedPipe
GetStringTypeA
WritePrivateProfileSectionW
CompareStringW
WritePrivateProfileSectionA
GlobalFlags
EnumCalendarInfoExA
GetProcessHeap
EnumResourceTypesA
GetModuleFileNameA
ExpandEnvironmentStringsW
EnumResourceNamesW
InterlockedIncrement
CreateDirectoryExW
ExitProcess
GetUserDefaultLCID
IsValidLocale
GetStartupInfoA
EnterCriticalSection
Sleep
LoadResource
EnumSystemLocalesA
GetCurrentThread
GetEnvironmentStrings
SetHandleCount
GetVersionExA
WriteProfileSectionA
VirtualFree
UnhandledExceptionFilter
GlobalCompact
SetWaitableTimer
GetTickCount
GetTimeZoneInformation
WriteConsoleOutputW
FindResourceExA
GetModuleHandleW
GetStringTypeW
GetProfileIntA
MultiByteToWideChar
HeapCreate
WaitForSingleObjectEx
DeleteCriticalSection
GetFileSize
GetConsoleCP
GetLocaleInfoW
EnumDateFormatsExW
Sections
.text Size: 144KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 104KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ