Static task
static1
Behavioral task
behavioral1
Sample
7cdcd3f70b1a71ebb41447f7aafc7577ffc01fd2a29c826f02ede3279b87fe67.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7cdcd3f70b1a71ebb41447f7aafc7577ffc01fd2a29c826f02ede3279b87fe67.exe
Resource
win10v2004-20221111-en
General
-
Target
7cdcd3f70b1a71ebb41447f7aafc7577ffc01fd2a29c826f02ede3279b87fe67
-
Size
207KB
-
MD5
310d0b38e7972e56c94d5a21e673bc27
-
SHA1
9b31f14f3130e0554f58b95f968f2a61db8a93cb
-
SHA256
7cdcd3f70b1a71ebb41447f7aafc7577ffc01fd2a29c826f02ede3279b87fe67
-
SHA512
a7536ae02a6767c7faa7fe217826e1d545a3ffaf598d326c5216456ad431142ce2d05f2d9467d18220c765342ee3f5b0e5afee1d1f4fca9f69e28468d27eb046
-
SSDEEP
6144:6x6FU1ciicpoXuhJG8Doek8T8IBnsEUVvZ:64K65cPhJxDYw8ksEUNZ
Malware Config
Signatures
Files
-
7cdcd3f70b1a71ebb41447f7aafc7577ffc01fd2a29c826f02ede3279b87fe67.exe windows x86
ff25993db4e48d85fc5d18295f3c96fd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetThreadPriority
HeapFree
GetLocaleInfoA
SetEndOfFile
lstrcmpiW
IsBadWritePtr
CloseHandle
MultiByteToWideChar
ReadFile
InterlockedExchange
GetPrivateProfileStringW
GetFileAttributesW
GetFullPathNameW
CreateEventW
lstrcpyA
GetCurrentProcess
SetThreadPriority
GlobalUnlock
SetEvent
lstrlenW
HeapAlloc
lstrcpyW
SetLastError
lstrcmpW
GlobalHandle
GetFileSize
InterlockedIncrement
WaitForMultipleObjects
IsBadReadPtr
WideCharToMultiByte
QueryPerformanceCounter
GlobalFindAtomA
VirtualFree
GetLastError
GetCurrentProcessId
WaitForSingleObject
InitializeCriticalSection
ReleaseSemaphore
GetSystemTimeAsFileTime
GetProcessHeap
DeleteCriticalSection
lstrcpynW
LoadLibraryW
CreateFileW
GetQueuedCompletionStatus
FreeLibrary
EnterCriticalSection
GetDiskFreeSpaceW
SetUnhandledExceptionFilter
GetACP
GetVersionExW
GlobalFree
GlobalLock
GetCurrentThread
CreateSemaphoreW
GlobalAlloc
IsBadCodePtr
ResetEvent
InterlockedDecrement
WriteFile
SetFilePointer
LeaveCriticalSection
MulDiv
GetProfileIntA
lstrlenA
GetProcAddress
GlobalMemoryStatus
GetTickCount
GetModuleFileNameA
CreateThread
oleaut32
VarBstrFromI2
VarBstrFromUI4
VarBstrFromUI8
VarBstrFromUI1
VarBstrFromDec
VarBstrFromDisp
VarBstrFromI8
VarBstrFromR8
VarBstrFromI1
VarBstrFromDate
VarBstrFromR4
VarBstrFromUI2
VarBstrFromCy
VarBstrFromI4
user32
IsWindow
IsRectEmpty
SendMessageW
EnableWindow
GetWindowLongW
ShowWindow
SetDlgItemTextW
ClientToScreen
GetDlgItem
DestroyWindow
LoadCursorW
CheckRadioButton
TranslateMessage
SetDlgItemInt
IsWindowVisible
CheckDlgButton
GetDC
GetAsyncKeyState
LoadStringW
DispatchMessageW
InvalidateRect
GetClientRect
ReleaseDC
CreateDialogParamW
GetDesktopWindow
SetWindowLongW
GetDlgItemInt
SetCursor
GetWindowRect
MoveWindow
DefWindowProcW
PeekMessageW
msls31
LssbGetNumberDnodesInSubline
LssbGetVisibleDcpInSubline
LssbGetDurTrailWithPensInSubline
LssbGetObjDimSubline
LsCompressSubline
LssbGetPlsrunsFromSubline
Sections
.text Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 117KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ