Static task
static1
Behavioral task
behavioral1
Sample
d7eef1f0557f02579ee3be8cd597846384c151298d36548fd8e4adbcf287e494.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d7eef1f0557f02579ee3be8cd597846384c151298d36548fd8e4adbcf287e494.exe
Resource
win10v2004-20221111-en
General
-
Target
d7eef1f0557f02579ee3be8cd597846384c151298d36548fd8e4adbcf287e494
-
Size
300KB
-
MD5
52494f40fdd7b2057e2f1eac06f86af2
-
SHA1
98ba617f09dec6c6b527f9269781c88c9be74a32
-
SHA256
d7eef1f0557f02579ee3be8cd597846384c151298d36548fd8e4adbcf287e494
-
SHA512
f4f873e8c6e58798addb9eda8a7983250a90703d58fae78f22b86dc1530f50332151b496a6eae7c5db801a82890b0e73089f69de73e43b18c2345ae6eb294128
-
SSDEEP
3072:2Gr+8thSUe3Jca1HcK27W35HC583ARB75lsQ71u4V0WBoMDrRwzOCF6pbLFPmSds:BneZcA2+5HK83Afzx0WhDruCnjNZXQ
Malware Config
Signatures
Files
-
d7eef1f0557f02579ee3be8cd597846384c151298d36548fd8e4adbcf287e494.exe windows x86
70762c6d3fd4c84d4e66cd660cf8b530
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
vbcfg
GetEvalDays
SetInitOptionsStruct
SetInstallInfo
IsOnlyAvailableForCD
IsNeedSerialNumber
GetBuiltInfoText
IsFileDestoryed
GetOEMClientName
IsThisOEMEdition
GetInitOptionsStruct
WriteSerNO
kernel32
lstrcpyA
GetSystemDefaultLangID
CloseHandle
CreateFileA
DeviceIoControl
Sleep
lstrcatA
GetSystemDirectoryA
GetProfileIntA
ExitProcess
SetCurrentDirectoryA
SetLastError
CreateThread
CopyFileA
GetWindowsDirectoryA
CreateDirectoryA
GetFileAttributesA
GetDiskFreeSpaceA
GetLogicalDrives
GetFileSize
SetFileAttributesA
GetDriveTypeA
DeleteFileA
FindClose
FindFirstFileA
GetPrivateProfileStringA
GetLocalTime
MapViewOfFile
CreateFileMappingA
GetComputerNameA
GetModuleFileNameA
lstrlenA
GetCurrentProcess
SetErrorMode
GetVersion
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
GetCPInfo
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpiA
LocalFree
GetCurrentThread
LocalAlloc
RemoveDirectoryA
GetLastError
GetVersionExA
RtlUnwind
GetCurrentDirectoryA
FreeLibrary
LoadLibraryA
GetProcAddress
GetExitCodeProcess
CreateProcessA
WaitForSingleObject
GetOEMCP
GetTimeZoneInformation
GetACP
GetLocaleInfoW
SetConsoleCtrlHandler
SetEndOfFile
SetEnvironmentVariableA
CompareStringA
CompareStringW
FindNextFileA
GetTempPathA
GetFullPathNameA
HeapFree
HeapAlloc
TerminateProcess
WriteFile
MoveFileA
IsBadWritePtr
HeapReAlloc
ReadFile
FatalAppExitA
LeaveCriticalSection
VirtualAlloc
SetFilePointer
InitializeCriticalSection
DeleteCriticalSection
HeapCreate
HeapDestroy
VirtualFree
GetStartupInfoA
GetModuleHandleA
GetCommandLineA
InterlockedDecrement
EnterCriticalSection
FileTimeToLocalFileTime
FileTimeToSystemTime
InterlockedIncrement
user32
SetForegroundWindow
SetWindowTextA
OemToCharA
SetWindowPos
SetFocus
CreateDialogParamA
UpdateWindow
DestroyWindow
GetSystemMetrics
MoveWindow
MessageBoxA
SendMessageA
FindWindowA
LoadStringA
CharNextA
wsprintfA
CharUpperA
CharUpperBuffA
ExitWindowsEx
PeekMessageA
TranslateMessage
DispatchMessageA
IsWindow
EnableWindow
IsWindowEnabled
ShowWindow
advapi32
OpenProcessToken
FreeSid
RegDeleteKeyA
GetUserNameA
RegDeleteValueA
ImpersonateSelf
RegEnumValueA
AllocateAndInitializeSid
InitializeSecurityDescriptor
OpenThreadToken
InitializeAcl
AddAccessAllowedAce
GetLengthSid
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
AccessCheck
RevertToSelf
IsValidSecurityDescriptor
AdjustTokenPrivileges
RegOpenKeyExA
LookupPrivilegeValueA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
mscomstf
FWriteToLogFile
FCloseLogFile
FAddSectionKeyFileToCopyList
FOpenLogFile
FAddSpecialFileToCopyList
FSetSilent
FAddSectionFilesToCopyList
FMakeListInfSectionField
FSetSymbolToListOfInfKeys
FSetBeepingMode
FRemoveSymbol
CbGetListItem
EercErrorHandler
DoMsgBox
FReplaceListItem
FAddListItem
FOpenInf
UsGetListLength
CbGetSymbolValue
FValidDir
CbGetInfSectionKeyField
FParsePathIntoPieces
FValidPath
msdetstf
CbFindTargetOnEnvVar
FDoesIniSectionExist
FDoesIniKeyExist
CbGetIniKeyString
FHasMouseInstalled
FHasMonochromeDisplay
FHas87MathChip
FGetSerialPortsList
FGetParallelPortsList
FGetProcessorType
FIsDriverInConfig
CbFindFileInTree
FDirExists
CbGetVersionOfFile
CbGetDateOfFile
FDoesFileExist
CbGetEnvVariableValue
FGetNetworkDrivesList
FGetRemovableDrivesList
FGetLocalHardDrivesList
FGetValidDrivesList
LcbFreeDrive
LcbTotalDrive
FIsRemoteDrive
FIsRemoveDrive
FIsLocalHardDrive
LGetVersionNthField
LcbGetSizeOfFile
FIsValidDrive
msinsstf
FRemoveIniSection
FIsFileWritable
FSetRestartDir
FRestartListEmpty
FExitExecRestart
FPrependToPath
TerminateInstall
FCreateIniKeyValue
FRemoveIniKey
FCopyOneFile
FClearBillboardList
FAddToBillboardList
FCreateProgManGroup
FCreateProgManGroupEx
FShowProgManGroup
FShowProgManGroupEx
FStampResource
FInitializeInstall
FCreateDir
FRemoveDir
FIsDirWritable
FCreateSysIniKeyValue
WFindFileUsingFileOpen
ProSetPos
ResetCopyList
FDumpCopyListToFile
YnrcBackupFile
YnrcRemoveFile
GrcCopyFilesInCopyList
FCreateProgManItemEx
FCreateProgManItem
LcbGetCopyListCost
msshlstf
FSetAbout
TerminateFrame
HinstFrame
FRestoreCursor
HShowWaitCursor
FSetSymbolValue
InitializeFrame
FSetBitmap
HwndFrame
msuilstf
FKillNDialogs
FDoDialogExt
shlwapi
SHDeleteKeyA
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rizecge Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xtbbjec Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE