Static task
static1
Behavioral task
behavioral1
Sample
79c6f9e1c57604b16469794a7efa4ab526d509ac852d004a0a8ec7565a63e706.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
79c6f9e1c57604b16469794a7efa4ab526d509ac852d004a0a8ec7565a63e706.exe
Resource
win10v2004-20221111-en
General
-
Target
79c6f9e1c57604b16469794a7efa4ab526d509ac852d004a0a8ec7565a63e706
-
Size
536KB
-
MD5
c4faf0541329e3e1638f94d21edea2e3
-
SHA1
81da5adb842a15aac06581670cfb811be2bcd9ed
-
SHA256
79c6f9e1c57604b16469794a7efa4ab526d509ac852d004a0a8ec7565a63e706
-
SHA512
4953fcbfc44150a9fda63d1bd047bdf0440e10ce1f3ece3e3949bc0d2cd4f4a48cc4ba400ba4110c4e00abfdd080c6420a74c1840fe32b76a2123e9e65d85607
-
SSDEEP
12288:VVIlNsjzzcwgxwmQx6weN7TPsTKQXMIeLlV3bvs/L4J2:VelNsjzzcwgxwnAJTPsTKyMXLlV3bo
Malware Config
Signatures
Files
-
79c6f9e1c57604b16469794a7efa4ab526d509ac852d004a0a8ec7565a63e706.exe windows x86
f60960115c73bf8dc16831ca2404548f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DefWindowProcW
PtInRect
CopyAcceleratorTableA
InSendMessageEx
LoadIconA
CreateWindowExW
SetMessageQueue
CreateMenu
SendIMEMessageExW
DestroyWindow
DeleteMenu
EnumPropsExA
CreateWindowStationA
EnumWindowStationsW
GetMenuCheckMarkDimensions
RegisterClassA
RegisterClassExA
GetWindowContextHelpId
GetWindowTextLengthA
SetCaretBlinkTime
CreateMDIWindowW
SetProcessDefaultLayout
MessageBoxW
ShowWindow
kernel32
GetCurrentProcessId
GetStartupInfoW
SetVolumeLabelA
EnumSystemCodePagesA
TlsFree
HeapDestroy
VirtualAlloc
GetCurrentThread
GetUserDefaultLCID
IsValidLocale
WaitForSingleObjectEx
WaitCommEvent
DebugActiveProcess
ResumeThread
GetLocaleInfoA
GetCommandLineA
EnterCriticalSection
FindAtomW
GetEnvironmentStringsW
RaiseException
WriteFile
LoadLibraryA
FlushFileBuffers
GetSystemInfo
ReadFile
GetEnvironmentStrings
LCMapStringW
TlsSetValue
GetACP
DeleteCriticalSection
HeapSize
TlsGetValue
GetNamedPipeHandleStateA
GetPrivateProfileSectionA
ExitProcess
HeapFree
GetLongPathNameW
QueryPerformanceCounter
SetStdHandle
EnumDateFormatsA
GetPrivateProfileSectionNamesA
GetStringTypeA
HeapReAlloc
GetFullPathNameW
LCMapStringA
GetCurrentProcess
LocalShrink
WritePrivateProfileStringW
IsValidCodePage
GetFileType
ReleaseMutex
TerminateProcess
SetFilePointer
ReadConsoleOutputA
CompareStringA
EnumCalendarInfoA
HeapCreate
UnlockFileEx
CloseHandle
HeapValidate
GetStdHandle
SetEnvironmentVariableA
VirtualProtect
FindResourceExA
GetStringTypeW
InterlockedExchange
FileTimeToSystemTime
GetTimeZoneInformation
FindClose
GetCommandLineW
GetSystemTime
OpenMutexA
SetCriticalSectionSpinCount
VirtualFree
GetTickCount
RtlZeroMemory
UnhandledExceptionFilter
LeaveCriticalSection
CreateMailslotA
CompareFileTime
GetModuleFileNameA
RtlFillMemory
EnumDateFormatsExA
GetCPInfo
GetCurrentThreadId
SetLastError
GlobalHandle
lstrcmpiW
DuplicateHandle
EnumDateFormatsW
GetStartupInfoA
GetVersionExA
EnumSystemLocalesA
GetLocaleInfoW
GetLastError
GetDateFormatA
GlobalUnfix
GlobalFlags
GetModuleHandleA
FreeEnvironmentStringsW
RtlUnwind
GetOEMCP
DeleteFiber
GlobalDeleteAtom
GetProcAddress
WideCharToMultiByte
VirtualQuery
GetModuleFileNameW
EnumCalendarInfoW
GetConsoleCP
CompareStringW
GetFileSize
CreateMutexA
CreateFileMappingW
GetPriorityClass
GetTimeFormatA
SetHandleCount
UnmapViewOfFile
MultiByteToWideChar
InitializeCriticalSection
GetSystemTimeAsFileTime
TlsAlloc
FreeEnvironmentStringsA
IsBadWritePtr
HeapAlloc
comctl32
ImageList_SetImageCount
ImageList_GetBkColor
ImageList_Read
ImageList_DrawIndirect
CreateStatusWindowW
InitCommonControlsEx
ImageList_SetIconSize
ImageList_Destroy
ImageList_DragShowNolock
_TrackMouseEvent
ImageList_GetImageCount
Sections
.text Size: 152KB - Virtual size: 149KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 248KB - Virtual size: 245KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ