Static task
static1
Behavioral task
behavioral1
Sample
7f398e33a5ce0277eee219109ee94048ef38507c13826fb1d6ae2057dc9ce6f4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7f398e33a5ce0277eee219109ee94048ef38507c13826fb1d6ae2057dc9ce6f4.exe
Resource
win10v2004-20221111-en
General
-
Target
7f398e33a5ce0277eee219109ee94048ef38507c13826fb1d6ae2057dc9ce6f4
-
Size
213KB
-
MD5
382a8e5da60441f56009a345eebda06a
-
SHA1
6c245b17bca0bdb4a8889f058985e36e8a4d7d9c
-
SHA256
7f398e33a5ce0277eee219109ee94048ef38507c13826fb1d6ae2057dc9ce6f4
-
SHA512
6749a608d992186d325cc793aba652339a384572a6e9ad80533c112ff91fbc99bc54804c6d683476b3af30dbbcc568a6367f29df4124bac4e5faf79c1e31bc51
-
SSDEEP
3072:u+fGbVZ9p24akr2HalKuJDc5Taqewrgi8V12gh0L99ByuYQ/UFq6NAS+SBy9EPUA:i9p2LkrNc9trg1fa9JULsSB1CJluLjd
Malware Config
Signatures
Files
-
7f398e33a5ce0277eee219109ee94048ef38507c13826fb1d6ae2057dc9ce6f4.exe windows x86
9b8156d635ddda448b6fd740c6747658
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetAsyncKeyState
ReleaseDC
GetWindowRect
CreateDialogParamW
GetClientRect
DestroyWindow
CheckDlgButton
GetDlgItemInt
GetDC
ClientToScreen
DefWindowProcW
GetWindowLongW
IsRectEmpty
SetDlgItemInt
GetDlgItem
EnableWindow
LoadCursorW
SetWindowLongW
DispatchMessageW
SetDlgItemTextW
InvalidateRect
SetCursor
PeekMessageW
IsWindowVisible
IsWindow
ShowWindow
CheckRadioButton
GetDesktopWindow
LoadStringW
MoveWindow
SendMessageW
TranslateMessage
msoeacct
DllGetClassObject
GetDllMajorVersion
ValidEmailAddress
DllCanUnloadNow
HrCreateAccountManager
kernel32
SetLastError
GetQueuedCompletionStatus
GetProcessHeap
GetFileSize
GetProfileIntA
SetUnhandledExceptionFilter
InitializeCriticalSection
GetLastError
GetProcAddress
WriteFile
lstrcmpW
CreateFileW
EnterCriticalSection
GetDiskFreeSpaceW
GetVersionExW
GetPrivateProfileStringW
lstrcpynW
GlobalFree
LoadLibraryW
lstrlenW
FreeLibrary
IsBadWritePtr
ResetEvent
GetCurrentProcess
GetCurrentThread
CreateEventW
MultiByteToWideChar
WaitForSingleObject
SetThreadPriority
GetModuleFileNameA
SetFilePointer
lstrlenA
WaitForMultipleObjects
GetFullPathNameW
GlobalHandle
InterlockedExchange
IsBadCodePtr
lstrcmpiW
GlobalMemoryStatus
ReleaseSemaphore
GetSystemTimeAsFileTime
GetTickCount
GlobalAlloc
HeapAlloc
GlobalUnlock
GetThreadPriority
SetEvent
LeaveCriticalSection
GetFileAttributesW
InterlockedDecrement
CreateThread
GetACP
HeapFree
GetCurrentProcessId
QueryPerformanceCounter
GlobalFindAtomW
CloseHandle
VirtualFree
SetEndOfFile
lstrcpyW
InterlockedIncrement
ReadFile
MulDiv
DeleteCriticalSection
WideCharToMultiByte
lstrcpyA
CreateSemaphoreW
GlobalLock
IsBadReadPtr
oleaut32
VarBstrFromR4
VarBstrFromI1
VarBstrFromUI2
VarBstrFromI2
VarBstrFromCy
VarBstrFromDate
VarBstrFromDec
VarBstrFromR8
VarBstrFromUI1
VarBstrFromI8
VarBstrFromUI8
VarBstrFromDisp
VarBstrFromI4
VarBstrFromUI4
msls31
LssbGetNumberDnodesInSubline
LsCompressSubline
LssbGetVisibleDcpInSubline
LssbGetObjDimSubline
LssbGetPlsrunsFromSubline
LssbGetDurTrailWithPensInSubline
msnetobj
DllGetClassObject
DllRegisterServer
DllCanUnloadNow
Sections
.text Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 117KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 6.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ