Static task
static1
Behavioral task
behavioral1
Sample
7765af6ca4897e55e56b78a6bd2a856e41e9c5965490ae3052d4457b687ab897.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7765af6ca4897e55e56b78a6bd2a856e41e9c5965490ae3052d4457b687ab897.exe
Resource
win10v2004-20220812-en
General
-
Target
7765af6ca4897e55e56b78a6bd2a856e41e9c5965490ae3052d4457b687ab897
-
Size
202KB
-
MD5
6ae7f28da92cea59ded8335921ce292b
-
SHA1
6e33b56c55e0281b64890aea86cff3eec31c34c0
-
SHA256
7765af6ca4897e55e56b78a6bd2a856e41e9c5965490ae3052d4457b687ab897
-
SHA512
d40534b48bcaa46bfd339a03f78a4e245cb17e98d8dc493f1c8a6e40097b28bc38123454e082618cba2b400e1a4440315c690fa219c430d8f8e8da71c76a98ae
-
SSDEEP
3072:pQY4Ag0FuA1wwOZ+lyHT/TJVJ3NBZ6mCjL:mvAOA1w1MKhPNfo
Malware Config
Signatures
Files
-
7765af6ca4897e55e56b78a6bd2a856e41e9c5965490ae3052d4457b687ab897.exe windows x86
dd94be5c1c64001af4ea808e503cc835
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBoxA
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
ole32
CoTaskMemFree
CoCreateInstance
StgOpenStorage
CoInitialize
GetRunningObjectTable
StgIsStorageFile
StringFromCLSID
CoCreateGuid
CreateItemMoniker
CoUninitialize
gdi32
CreateDIBitmap
RealizePalette
GetDeviceCaps
CreatePalette
GetSystemPaletteEntries
GetStockObject
DeleteObject
DeleteDC
BitBlt
SelectObject
CreateCompatibleDC
CreateSolidBrush
CreateFontIndirectA
GetObjectA
SetTextColor
SetBkMode
GetTextExtentPointA
SelectPalette
TranslateCharsetInfo
kernel32
EnumSystemLocalesA
IsValidLocale
GetCurrentProcessId
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
IsBadWritePtr
OpenWaitableTimerA
VerifyVersionInfoA
ReadConsoleOutputCharacterA
SetConsoleMode
GetThreadContext
GetUserDefaultLCID
GetLastError
GetNumberOfConsoleMouseButtons
CloseHandle
CreateFileA
ExitProcess
GetFileType
GetSystemTime
GetFileSize
GetStdHandle
RaiseException
ReadFile
RtlUnwind
SetEndOfFile
SetFilePointer
WriteFile
GetCommandLineA
GetModuleHandleA
MultiByteToWideChar
TlsGetValue
TlsSetValue
WideCharToMultiByte
LocalAlloc
LocalFree
VirtualAlloc
VirtualFree
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
IsBadCodePtr
LCMapStringA
LCMapStringW
GetStringTypeW
GetStringTypeA
IsBadReadPtr
FindClose
VirtualQuery
VirtualProtect
FindFirstFileA
SearchPathA
lstrcpynA
SetEvent
ResetEvent
QueryPerformanceCounter
SystemTimeToFileTime
HeapFree
HeapAlloc
SetStdHandle
TerminateProcess
GetStartupInfoA
GetVersion
HeapReAlloc
HeapSize
GetCurrentThreadId
TlsAlloc
GetEnvironmentVariableA
HeapDestroy
HeapCreate
SetUnhandledExceptionFilter
GetCPInfo
GetACP
GetEnvironmentStringsW
GetOEMCP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
SetHandleCount
SizeofResource
LoadResource
MoveFileA
GetPrivateProfileSectionA
WritePrivateProfileStringA
GetTempFileNameA
GetWindowsDirectoryA
SetErrorMode
GetTempPathA
GetPrivateProfileIntA
ExpandEnvironmentStringsA
lstrcmpiA
GetTickCount
GetExitCodeThread
CreateThread
CopyFileA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
lstrlenA
GetPrivateProfileStringA
lstrcpyA
GetLocaleInfoA
GetCurrentThread
GetCurrentProcess
GetExitCodeProcess
RemoveDirectoryA
GetFileAttributesA
CreateDirectoryA
GetDriveTypeA
OpenFile
_lclose
GetDiskFreeSpaceA
FormatMessageA
FlushFileBuffers
IsValidCodePage
GetSystemInfo
WaitForSingleObject
lstrlenW
DeleteFileA
SetCurrentDirectoryA
SetLastError
GlobalHandle
GetSystemDefaultLCID
lstrcmpA
GetModuleFileNameA
CreateProcessA
FindResourceA
FreeLibrary
SetFileAttributesA
LockResource
CreateFileMappingA
UnmapViewOfFile
MapViewOfFile
LoadLibraryA
GetProcAddress
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
CompareStringA
Sleep
GetVersionExA
CompareStringW
CreateEventA
lstrcatA
QueryPerformanceFrequency
InterlockedIncrement
InterlockedDecrement
GetSystemTimeAsFileTime
GetModuleHandleW
TlsFree
IsDebuggerPresent
Sections
.data Size: 30KB - Virtual size: 144.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.BSS Size: 129KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ