Static task
static1
Behavioral task
behavioral1
Sample
760cddde849ebdf11ea8ea7af05773e4fdf8f3f8375c8e332baa84196f9de860.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
760cddde849ebdf11ea8ea7af05773e4fdf8f3f8375c8e332baa84196f9de860.exe
Resource
win10v2004-20220812-en
General
-
Target
760cddde849ebdf11ea8ea7af05773e4fdf8f3f8375c8e332baa84196f9de860
-
Size
222KB
-
MD5
b67f795f92073db46e8579aaba032d45
-
SHA1
bbce2ec58ebef6af2cbea2cd8ef63a05ae3b4f04
-
SHA256
760cddde849ebdf11ea8ea7af05773e4fdf8f3f8375c8e332baa84196f9de860
-
SHA512
774ad1f2102eafab93e54d060b25a84c3d4615fa1a57cd12cca894f1820bf3d214d4adf070d2a71637d54e1d6c0bee15938644d13ad13e63f7467d5083063461
-
SSDEEP
6144:87b3kIWg/I+Omd6n1ENGQNGmt7pdZoLxja6:8H0xtOx+xW6
Malware Config
Signatures
Files
-
760cddde849ebdf11ea8ea7af05773e4fdf8f3f8375c8e332baa84196f9de860.exe windows x86
7fa474f38a74af5464c68ac780027b22
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsCharAlphaNumericA
CopyAcceleratorTableA
GetGuiResources
RegisterHotKey
TrackMouseEvent
GetClipboardSequenceNumber
GetDlgCtrlID
GetAltTabInfoA
SendDlgItemMessageA
InflateRect
PeekMessageA
GetScrollRange
EnumWindows
PostQuitMessage
GetDialogBaseUnits
CallWindowProcA
CharUpperW
SetParent
SendMessageA
ModifyMenuA
AppendMenuW
EqualRect
CallWindowProcW
SetRect
ExcludeUpdateRgn
IsClipboardFormatAvailable
GetCaretBlinkTime
GetUserObjectInformationW
IsWindowUnicode
CreateIconFromResourceEx
ChildWindowFromPoint
GetMenuDefaultItem
GetFocus
GetOpenClipboardWindow
DrawAnimatedRects
EndDeferWindowPos
GetKeyboardLayoutList
MapVirtualKeyA
IsWindowVisible
GetTitleBarInfo
IsCharUpperW
IsZoomed
RegisterShellHookWindow
GetWindowPlacement
InvalidateRect
ChangeClipboardChain
GetNextDlgGroupItem
RedrawWindow
GetKeyboardType
GetDCEx
IsCharAlphaA
ToAsciiEx
GetDesktopWindow
comdlg32
GetOpenFileNameA
CommDlgExtendedError
shell32
SHBrowseForFolderW
SHGetFileInfoW
ole32
OleCreateMenuDescriptor
OleDuplicateData
CreateILockBytesOnHGlobal
advapi32
CryptGetHashParam
RegCreateKeyExW
gdi32
CreateDCA
CopyMetaFileA
TextOutA
SetMapMode
CombineRgn
crypt32
CertFreeCertificateContext
comctl32
InitCommonControlsEx
version
GetFileVersionInfoA
winspool.drv
DocumentPropertiesW
kernel32
HeapSize
RtlUnwind
HeapReAlloc
VirtualAlloc
IsValidCodePage
GetACP
GetCPInfo
InitializeCriticalSectionAndSpinCount
LoadLibraryA
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
HeapFree
VirtualFree
GetLocaleInfoA
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsAlloc
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetLastError
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
WriteFile
ExitProcess
GetProcAddress
Sleep
GetModuleHandleW
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
InterlockedDecrement
GetStringTypeW
HeapCreate
TlsSetValue
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
TlsGetValue
WTSGetActiveConsoleSessionId
SetMessageWaitingIndicator
ReleaseMutex
IsProcessInJob
RequestWakeupLatency
SetProcessPriorityBoost
CreateTapePartition
CreateTimerQueue
GetStdHandle
ConvertFiberToThread
MulDiv
GetModuleFileNameA
FindNextChangeNotification
MapUserPhysicalPages
GlobalUnWire
ResetWriteWatch
GetThreadPriority
GetThreadContext
LockResource
HeapAlloc
FindFirstFileExW
ClearCommError
CreateMemoryResourceNotification
GetProcessVersion
LocalUnlock
GetProcessAffinityMask
GetProcessHeap
GetCommTimeouts
AssignProcessToJobObject
CreateEventW
GetCurrentProcess
InitializeCriticalSection
FindFirstFileA
WaitForSingleObject
GetOEMCP
GetCurrentDirectoryW
SetErrorMode
GetSystemDirectoryA
SearchPathW
GetLongPathNameW
GetFileInformationByHandle
GetExitCodeProcess
GlobalFree
SetCurrentDirectoryA
VirtualAllocEx
RaiseException
WritePrivateProfileStringA
SetFilePointer
IsBadWritePtr
OpenThread
GetPrivateProfileStringA
GetCommandLineA
GetStartupInfoA
Sections
.text Size: 146KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ