Static task
static1
Behavioral task
behavioral1
Sample
7ca82c729ec6173f0fa0c7f4a83b100cd977dedca69b213b3a06041ba2664e64.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7ca82c729ec6173f0fa0c7f4a83b100cd977dedca69b213b3a06041ba2664e64.exe
Resource
win10v2004-20220901-en
General
-
Target
7ca82c729ec6173f0fa0c7f4a83b100cd977dedca69b213b3a06041ba2664e64
-
Size
115KB
-
MD5
09a14c7a94eec383f6fffadcca8431b7
-
SHA1
d2fa67e05b24c37b3eef1df4719dfbea4a17cf8e
-
SHA256
7ca82c729ec6173f0fa0c7f4a83b100cd977dedca69b213b3a06041ba2664e64
-
SHA512
77337771086d84deef91f96a419f5934f1dd330dea1c209640ccd9be101f6025c918b82ecbc904cb7f0c8875d40f305b69e01f2f40b344c7b83484acd68184dc
-
SSDEEP
3072:ffVp/jp0hYkB+y5z83cRJbAERDaJVsPrFgVUfIqVkS:ftpEYW+y632JkEMsqeIqV
Malware Config
Signatures
Files
-
7ca82c729ec6173f0fa0c7f4a83b100cd977dedca69b213b3a06041ba2664e64.exe windows x86
e6582bcb1abd646033c7076113ec709d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetAtomNameW
GetFileAttributesW
DeleteVolumeMountPointW
RtlUnwind
SetThreadAffinityMask
CreateMailslotW
CloseHandle
EnumDateFormatsExA
_lcreat
EnumSystemLanguageGroupsA
SetThreadAffinityMask
RemoveDirectoryW
TlsAlloc
GetProfileStringA
UnmapViewOfFile
GetVolumeNameForVolumeMountPointA
EnumCalendarInfoW
FindResourceA
GlobalFix
SetVolumeLabelA
WideCharToMultiByte
OutputDebugStringA
CreateDirectoryW
FatalAppExitW
CreateFileMappingW
SetProcessShutdownParameters
SystemTimeToTzSpecificLocalTime
RemoveDirectoryA
OpenWaitableTimerA
GetCalendarInfoW
SetFilePointerEx
CreateSemaphoreA
GetVolumePathNameA
SetThreadAffinityMask
GlobalUnWire
Process32FirstW
TransactNamedPipe
CreateMutexA
FindNextChangeNotification
psapi
InitializeProcessForWsWatch
EnumDeviceDrivers
GetDeviceDriverFileNameA
user32
SystemParametersInfoA
CreateIconFromResourceEx
GetTopWindow
MapVirtualKeyA
LockSetForegroundWindow
SetCursor
DdeSetUserHandle
SystemParametersInfoW
CharNextW
GetClassInfoW
CharToOemA
ScrollWindow
SetLayeredWindowAttributes
LoadStringA
DialogBoxIndirectParamA
SetDlgItemTextW
CheckMenuItem
GetClassInfoExA
GetCursorInfo
TabbedTextOutW
GetMenuState
CloseWindow
SendNotifyMessageW
VkKeyScanExA
LockWorkStation
EnumDisplayMonitors
GetGUIThreadInfo
SwitchDesktop
IsRectEmpty
MenuItemFromPoint
UnregisterClassA
GetCaretPos
GetScrollRange
ScrollWindowEx
GetSysColorBrush
LookupIconIdFromDirectoryEx
FindWindowA
RegisterShellHookWindow
SendMessageA
InsertMenuA
DefMDIChildProcW
wvsprintfA
SendDlgItemMessageW
GetKeyboardType
GetMonitorInfoW
OemToCharBuffW
GetClassWord
OpenInputDesktop
TileChildWindows
DrawTextExA
AnimateWindow
LoadMenuIndirectW
ShowCaret
DestroyAcceleratorTable
DestroyCursor
SetParent
SwapMouseButton
CharUpperW
PostQuitMessage
WinHelpW
CountClipboardFormats
GetScrollInfo
DlgDirListComboBoxA
CharPrevExA
GetMenuCheckMarkDimensions
SwitchToThisWindow
LoadMenuA
GetClassLongW
DeleteMenu
MapVirtualKeyExA
GetWindowTextLengthA
CharNextA
DefFrameProcW
DdeUninitialize
GetClassNameW
IMPQueryIMEA
GetSystemMetrics
DdeQueryNextServer
EditWndProc
GetSubMenu
LoadIconA
DefWindowProcW
RegisterClipboardFormatA
ShowWindowAsync
CloseDesktop
CreateAcceleratorTableW
SetWindowsHookA
LoadImageW
SendIMEMessageExW
DdeCmpStringHandles
SendMessageCallbackW
AppendMenuW
CharUpperBuffA
SendInput
DialogBoxParamA
DdeAbandonTransaction
ExcludeUpdateRgn
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 38KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 452B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE