Static task
static1
Behavioral task
behavioral1
Sample
7a13c34c67e4580b28f83d90125c587af8ddf1ffe61dc8afd633a2b560848fa1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7a13c34c67e4580b28f83d90125c587af8ddf1ffe61dc8afd633a2b560848fa1.exe
Resource
win10v2004-20221111-en
General
-
Target
7a13c34c67e4580b28f83d90125c587af8ddf1ffe61dc8afd633a2b560848fa1
-
Size
100KB
-
MD5
11f17b107fb10c7e7d2e208af4949770
-
SHA1
940db2851b4dafb25fdc60be825cf2da3a6a3f5c
-
SHA256
7a13c34c67e4580b28f83d90125c587af8ddf1ffe61dc8afd633a2b560848fa1
-
SHA512
4c1bb53840e68c8edd6add5b443ee850096d437ab2b8797da65a597c6b3dd02fb97689dfa29eea643581fcfe6781c7218c290a86fcd756adbf20a25f9e6b7704
-
SSDEEP
1536:+9a+2m6oXmu9A2jin5mzVLdOaGMH1wvSZeM7+Rot:+9Kmzmu9A7nnaRYEX+Rot
Malware Config
Signatures
Files
-
7a13c34c67e4580b28f83d90125c587af8ddf1ffe61dc8afd633a2b560848fa1.exe windows x86
a759897c8af446d57f33357881685921
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MapViewOfFile
UnmapViewOfFile
OpenEventA
GetSystemDirectoryW
CreateEventA
LoadLibraryA
lstrlenA
SetLastError
WaitForSingleObject
GetWindowsDirectoryW
lstrlenW
lstrcpyW
lstrcatW
FreeLibrary
GetVersionExW
GetModuleHandleA
GetProcAddress
GetVersionExA
GetCommandLineW
GetPrivateProfileStringW
GetModuleFileNameW
lstrcpynW
GetVersion
CreateThread
HeapAlloc
LoadResource
LockResource
MultiByteToWideChar
GetFileSize
SetFilePointer
GetExitCodeThread
Sleep
CloseHandle
HeapFree
GetProcessHeap
WriteFile
LoadLibraryW
GetLastError
WideCharToMultiByte
GetStartupInfoA
user32
PostQuitMessage
TranslateMessage
wsprintfW
MessageBoxA
RegisterClassExA
LoadCursorA
LoadIconA
UpdateWindow
ShowWindow
GetDlgItem
SetWindowTextA
GetDesktopWindow
wsprintfA
DestroyWindow
SetWindowPos
GetSystemMetrics
GetWindowRect
MoveWindow
ClientToScreen
GetClientRect
gdi32
DeleteObject
advapi32
CloseServiceHandle
AllocateAndInitializeSid
LookupAccountSidW
FreeSid
RegOpenKeyA
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
QueryServiceStatus
DeleteService
ControlService
ole32
CoTaskMemFree
CoTaskMemAlloc
odbc32
ord75
ord135
ord136
ord9
ord24
ord111
ord31
ord141
sqlunirl
_SetWindowText@8
_GetUnicodeRedirectionLayer@0
_LoadLibrary@4
_GetProcAddress_@8
_DeleteFile@4
_CreateFontIndirect@4
_DefWindowProc@16
_SendMessage@16
_MessageBox@16
_MAKEINTRESOURCE@4
_FindResource@12
_LoadString@16
_CreateFile@28
_GetComputerName@8
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
?terminate@@YAXXZ
setlocale
_wtoi
swprintf
vswprintf
_wcsupr
_wcsnicmp
wcscat
_except_handler3
__CxxFrameHandler
??2@YAPAXI@Z
_stricmp
wcslen
wcscpy
??3@YAXPAX@Z
wcsrchr
wcsstr
_wcsicmp
_purecall
_ltoa
wcsncpy
malloc
free
strstr
strncpy
Sections
.text Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE