Static task
static1
Behavioral task
behavioral1
Sample
c7007f0bdf956127023e954e513b43b5cceef4ce2435ad04cdb7e84a2dfd827b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c7007f0bdf956127023e954e513b43b5cceef4ce2435ad04cdb7e84a2dfd827b.exe
Resource
win10v2004-20220812-en
General
-
Target
c7007f0bdf956127023e954e513b43b5cceef4ce2435ad04cdb7e84a2dfd827b
-
Size
88KB
-
MD5
0561c43d9ba8dc19447031d864340390
-
SHA1
582b29f1d30c867721d03d2637843d4bb63b4ae1
-
SHA256
c7007f0bdf956127023e954e513b43b5cceef4ce2435ad04cdb7e84a2dfd827b
-
SHA512
159abb89ef1764e979bf19c3520790ad6b54c4958b9c700d072129b02cdbe1a4fb6fd9491c308a47c846063f58b48f72e8bdd40a380548484d99c1311461a3eb
-
SSDEEP
1536:0JqYxLcg0w/vKU1AhDBJ9Nf1ctcGO0QHRBUNlTP0pQ7dH:07Rj9ih1j0QHRB6lTsy7dH
Malware Config
Signatures
Files
-
c7007f0bdf956127023e954e513b43b5cceef4ce2435ad04cdb7e84a2dfd827b.exe windows x86
5bc54cdd37385b791f83ffaadfbbc4ff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msi
ord172
ord67
ord36
kernel32
GetFileAttributesW
GetVersion
LeaveCriticalSection
EnterCriticalSection
SetEvent
GetLogicalDrives
CloseHandle
GetCurrentProcess
GetLastError
LocalFree
FormatMessageA
WaitForMultipleObjects
SetLastError
GetModuleFileNameW
OutputDebugStringA
FreeLibrary
ReleaseMutex
WaitForSingleObject
CreateThread
CreateEventA
InitializeCriticalSection
OpenMutexA
GetShortPathNameA
GetModuleFileNameA
GetCommandLineA
GetWindowsDirectoryA
GetSystemDirectoryA
GetVersionExA
InterlockedExchange
HeapSize
SetStdHandle
GetSystemTimeAsFileTime
GetProcAddress
GetTickCount
QueryPerformanceCounter
SetFilePointer
HeapReAlloc
GetSystemInfo
VirtualAlloc
VirtualProtect
GetLocaleInfoA
VirtualFree
HeapCreate
HeapDestroy
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
WriteFile
FlushFileBuffers
TerminateProcess
ExitProcess
VirtualQuery
RtlUnwind
GetModuleHandleW
GetModuleHandleA
LoadLibraryW
LoadLibraryA
GetCurrentProcessId
GetStringTypeW
GetStringTypeA
HeapAlloc
GetStartupInfoA
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetACP
GetOEMCP
GetCPInfo
TlsAlloc
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
HeapFree
user32
FindWindowA
LoadImageA
GetMessageA
DispatchMessageA
DestroyIcon
LoadCursorA
DefWindowProcA
RegisterWindowMessageA
CreatePopupMenu
AppendMenuA
wsprintfA
GetCursorPos
TrackPopupMenu
PostMessageA
DestroyMenu
SetWindowLongA
GetDlgItemTextA
DialogBoxParamA
CreateWindowExA
RegisterClassExA
RegisterClassA
GetParent
GetWindowRect
GetSystemMetrics
MoveWindow
PostQuitMessage
MessageBoxA
ExitWindowsEx
DestroyWindow
GetWindowLongA
GetDlgItem
EnableWindow
EndDialog
SendMessageA
SendDlgItemMessageA
ShowWindow
SetForegroundWindow
TranslateMessage
advapi32
RegOpenKeyExA
RegDeleteValueA
RegSetValueExA
RegCloseKey
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
RegQueryValueExA
shell32
ShellExecuteA
Shell_NotifyIconA
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.uuu9 Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ