Static task
static1
Behavioral task
behavioral1
Sample
7c8d398ae63f35aff2ceb3d2c9b8a50597ed3e04712c311de6fa62e8dcde6b0c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7c8d398ae63f35aff2ceb3d2c9b8a50597ed3e04712c311de6fa62e8dcde6b0c.exe
Resource
win10v2004-20220812-en
General
-
Target
7c8d398ae63f35aff2ceb3d2c9b8a50597ed3e04712c311de6fa62e8dcde6b0c
-
Size
728KB
-
MD5
55418317710d82d3c40cb919be0e4d80
-
SHA1
4bca178f6768b96b3aac074fc2bee7ac2da672fc
-
SHA256
7c8d398ae63f35aff2ceb3d2c9b8a50597ed3e04712c311de6fa62e8dcde6b0c
-
SHA512
a58e11fdd9df7c4b3eaaefc95987705282644b787bb4e12310f16fd37433198c750bfbe513654a119420bc09111163bce4517a48a57c2094b29137bf84465d18
-
SSDEEP
12288:lERbN4Qy/q35DgDImE79P13/AYe48x+KYaVyJLS2T2MwyLJC:lwbN9iPq7513oYeL/YayLZhHJC
Malware Config
Signatures
Files
-
7c8d398ae63f35aff2ceb3d2c9b8a50597ed3e04712c311de6fa62e8dcde6b0c.exe windows x86
475f1963252c6937786dc02dee7bfbf7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
BitBlt
GetDeviceCaps
DeleteDC
GetStockObject
advapi32
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
RegSetValueExW
kernel32
GetTickCount
GetVersion
GetCommandLineA
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleA
GetLastError
GetCurrentThread
ExitProcess
VirtualAlloc
GetOEMCP
FindResourceA
VirtualFree
WriteFile
UnmapViewOfFile
CreateProcessA
GetACP
CloseHandle
ReadFile
TlsFree
MapViewOfFile
RaiseException
HeapSize
GetCPInfo
GetCommandLineW
LockResource
WritePrivateProfileStringA
SizeofResource
lstrlenW
GetEnvironmentStringsW
GetThreadLocale
LCMapStringA
GlobalFree
lstrlenA
LeaveCriticalSection
HeapAlloc
CreateFileA
TlsSetValue
GetFileType
Sleep
WaitForMultipleObjects
FindNextFileA
ResetEvent
FindFirstFileA
GetProcessHeap
GetProcAddress
GetModuleHandleW
LCMapStringW
GetFileSize
GetStartupInfoA
LoadLibraryA
GetVersionExA
TlsAlloc
QueryPerformanceCounter
SetEvent
lstrcmpiA
SetHandleCount
EnterCriticalSection
HeapFree
SetEndOfFile
VirtualQuery
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
SetUnhandledExceptionFilter
CreateThread
SetFilePointer
CreateMutexA
MultiByteToWideChar
InterlockedDecrement
UnhandledExceptionFilter
GetModuleFileNameA
FlushFileBuffers
IsDebuggerPresent
VirtualProtect
GetModuleFileNameW
GetEnvironmentVariableA
SetLastError
FormatMessageA
TlsGetValue
FindClose
InitializeCriticalSection
LocalFree
FreeLibrary
GetStringTypeW
HeapReAlloc
GetSystemTimeAsFileTime
InterlockedExchange
LoadLibraryW
WideCharToMultiByte
SetStdHandle
FreeEnvironmentStringsW
SetErrorMode
GetLocaleInfoA
GetConsoleMode
GetCurrentDirectoryA
GetCurrentProcess
DeleteCriticalSection
GetFileAttributesW
HeapDestroy
FindFirstFileW
WaitForSingleObject
FileTimeToSystemTime
ReleaseMutex
GetConsoleOutputCP
GetStdHandle
user32
GetFocus
CallWindowProcA
SendMessageA
DialogBoxParamA
MessageBoxA
EndDialog
ReleaseDC
GetDesktopWindow
LoadCursorA
ScreenToClient
SetTimer
SetWindowLongA
GetWindowRect
GetSystemMetrics
DefWindowProcA
KillTimer
FillRect
CreateWindowExA
GetWindowLongA
IsIconic
LoadStringA
EnableWindow
ShowWindow
UpdateWindow
GetParent
GetMessageA
GetActiveWindow
GetClientRect
GetDC
SetWindowPos
Sections
.text Size: 680KB - Virtual size: 1006KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ