Static task
static1
Behavioral task
behavioral1
Sample
7637390f7d7604f75eadbc132fc722e1a3997bc722dc23c5980f9d25c9e6ca94.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7637390f7d7604f75eadbc132fc722e1a3997bc722dc23c5980f9d25c9e6ca94.exe
Resource
win10v2004-20221111-en
General
-
Target
7637390f7d7604f75eadbc132fc722e1a3997bc722dc23c5980f9d25c9e6ca94
-
Size
14KB
-
MD5
9fbf5136a235a474b5c96a5ad0bd2758
-
SHA1
94aec3d8d76acb02db8e7dfb2eed2996593c98c4
-
SHA256
7637390f7d7604f75eadbc132fc722e1a3997bc722dc23c5980f9d25c9e6ca94
-
SHA512
15f6087acb7302880f85c48b16c52b35af2c07d733dc1d782fb851ed622acc93df42fb45274e4402423ed656db2976c4d07ee3810e069ba0060de312ad0960da
-
SSDEEP
192:7sDeGATxD4b0/iaHPJPxPXPiPZPQPhprAkGZb0uTziUeMkMFy+ZApUWk+M0ECbrX:7sDina2IbzHe+FPZAmWkRLy
Malware Config
Signatures
Files
-
7637390f7d7604f75eadbc132fc722e1a3997bc722dc23c5980f9d25c9e6ca94.exe windows x86
912f62b527641265e2551cc08c982215
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
fputws
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__initenv
exit
_cexit
_XcptFilter
_exit
_c_exit
_wsetlocale
_strnicmp
isdigit
atoi
wcslen
wcschr
_iob
_except_handler3
advapi32
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
CloseServiceHandle
OpenServiceW
OpenSCManagerW
RegCloseKey
kernel32
GetProcAddress
GetLastError
LoadLibraryW
FreeLibrary
FormatMessageW
LocalFree
LocalAlloc
MultiByteToWideChar
lstrcmpiA
GetModuleHandleA
GetModuleFileNameW
user32
wsprintfW
ole32
CoCreateInstanceEx
CoInitializeEx
CoUninitialize
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ