Static task
static1
Behavioral task
behavioral1
Sample
b7dade0dbd2aa60b54acb73f81aa8be78c88afbd2abb73406e07d49e766e53e2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b7dade0dbd2aa60b54acb73f81aa8be78c88afbd2abb73406e07d49e766e53e2.exe
Resource
win10v2004-20220812-en
General
-
Target
b7dade0dbd2aa60b54acb73f81aa8be78c88afbd2abb73406e07d49e766e53e2
-
Size
600KB
-
MD5
02e88cf5b83dc7bad05eefec9de5da59
-
SHA1
8a347dbec81c0ed568b9078cee868dcc6492628d
-
SHA256
b7dade0dbd2aa60b54acb73f81aa8be78c88afbd2abb73406e07d49e766e53e2
-
SHA512
5e3b77af1a49e400f0b0652caca7f899c013ad9e2f4ffbcb9ac958606206f3293ed4be759cddb222caa3b782b1abc3778d87cbd891870cb874a98bb5a45eed75
-
SSDEEP
12288:qfoEIyN58FKzJleFLdeAjBFWaY9eH5xrjwHbCEf82YvXIDPttd:qfoEIyN58FK9lM4A9FWKnH0b582mX4Vt
Malware Config
Signatures
Files
-
b7dade0dbd2aa60b54acb73f81aa8be78c88afbd2abb73406e07d49e766e53e2.exe windows x86
33fa7e83794068c3a3bf0990a3362ef7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadModule
_lwrite
MoveFileA
WideCharToMultiByte
ProcessIdToSessionId
CreateIoCompletionPort
IsValidLanguageGroup
FindFirstFileA
WriteProfileSectionW
FatalAppExitA
CreateEventW
GetCompressedFileSizeA
GetTimeFormatW
CallNamedPipeA
CompareFileTime
GetLogicalDriveStringsA
GetThreadPriorityBoost
CreateEventA
GetCurrentDirectoryA
FreeLibraryAndExitThread
GetVolumeNameForVolumeMountPointA
CreateNamedPipeA
WriteProfileSectionA
GetCurrencyFormatA
GetThreadLocale
CreateDirectoryW
FatalExit
lstrcpyA
SetCurrentDirectoryA
GetProcessWorkingSetSize
GetCommMask
GetProcessHeaps
GetCurrentProcessId
GlobalHandle
IsBadHugeWritePtr
GetPrivateProfileSectionNamesW
CreateDirectoryExA
SetThreadLocale
GetLongPathNameW
OpenFileMappingA
LockFile
GetVolumeInformationW
GetVersionExA
PrepareTape
ReadFileScatter
PeekNamedPipe
GetFileAttributesW
WaitForDebugEvent
EnumDateFormatsExA
SetTimeZoneInformation
SearchPathA
GetCommTimeouts
GetQueuedCompletionStatus
SetFileApisToANSI
GetBinaryTypeA
CreateTimerQueue
UnmapViewOfFile
TlsAlloc
DeleteVolumeMountPointA
GetSystemWindowsDirectoryW
ExpandEnvironmentStringsW
GlobalAddAtomW
GetFileSize
SystemTimeToTzSpecificLocalTime
EnumResourceLanguagesW
IsValidCodePage
FindResourceExW
FindNextChangeNotification
SetEnvironmentVariableW
GlobalGetAtomNameW
SetHandleCount
DosDateTimeToFileTime
WaitForSingleObjectEx
lstrcpynW
LockResource
EnumLanguageGroupLocalesW
BackupSeek
GetPrivateProfileSectionW
RtlUnwind
GetFullPathNameA
DeviceIoControl
GetFileAttributesA
GetTempPathW
CompareStringW
EnumResourceLanguagesA
RemoveDirectoryW
FreeUserPhysicalPages
FreeEnvironmentStringsA
GetProcessVersion
GetSystemTimeAdjustment
GetDateFormatW
CreateMailslotA
QueueUserWorkItem
SizeofResource
SetVolumeMountPointW
lstrcpynA
GetShortPathNameA
GetCurrencyFormatW
FreeLibrary
FindFirstVolumeMountPointA
Process32NextW
GetStdHandle
SetupComm
GetNamedPipeHandleStateA
SetMailslotInfo
GetDevicePowerState
CreateFileA
EndUpdateResourceA
GetVersionExW
CreateFileMappingA
GetEnvironmentVariableW
ContinueDebugEvent
GetPriorityClass
GetLogicalDrives
GetSystemDefaultLCID
FreeEnvironmentStringsW
ReplaceFileA
GetSystemTimeAsFileTime
CreateJobObjectW
_llseek
shlwapi
PathAppendA
user32
DestroyAcceleratorTable
DialogBoxIndirectParamA
GetWindowWord
VkKeyScanExA
DrawCaption
EqualRect
EnumThreadWindows
CloseWindowStation
CreateCursor
BeginPaint
DragObject
GetNextDlgGroupItem
EnumPropsW
CharNextExA
ExcludeUpdateRgn
OemKeyScan
LoadAcceleratorsW
DefMDIChildProcA
CreateDesktopA
GetClipCursor
SystemParametersInfoA
WaitMessage
DrawStateW
GetProcessDefaultLayout
DdeUninitialize
DrawFrame
GetMessageExtraInfo
Sections
.text Size: 199KB - Virtual size: 199KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 225KB - Virtual size: 436KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 170KB - Virtual size: 170KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ