Static task
static1
Behavioral task
behavioral1
Sample
d7d1d3d2d49e31451474d0c2815b9937390e363f581021198f049acb6e4e6487.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d7d1d3d2d49e31451474d0c2815b9937390e363f581021198f049acb6e4e6487.exe
Resource
win10v2004-20221111-en
General
-
Target
d7d1d3d2d49e31451474d0c2815b9937390e363f581021198f049acb6e4e6487
-
Size
788KB
-
MD5
b67ac8f02e9fad354bbdb4bc8207e2e0
-
SHA1
68b1113ede2472ee5fe9bd7085885f5cec70e706
-
SHA256
d7d1d3d2d49e31451474d0c2815b9937390e363f581021198f049acb6e4e6487
-
SHA512
d07f60101900efdbd5814ac6b0f2179d5e3a08916f70dc667801d13f68a9cf6846a6108e3a2461beba8615970900fd038243bcab726c0c3dc7860783b790c0af
-
SSDEEP
12288:hv/7jsL/+hRKfQzgmhUPHulzfy94ThV/fdfTHxwgrCeyxYicLp4cN:hvDjaoRdzgwUPHca94NBfxRwXec2p7N
Malware Config
Signatures
Files
-
d7d1d3d2d49e31451474d0c2815b9937390e363f581021198f049acb6e4e6487.exe windows x86
4e3858a19bdb2fbcd2cb673ec7252c71
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
kernel32
DosDateTimeToFileTime
GlobalLock
GlobalFree
GlobalUnlock
LocalFileTimeToFileTime
GlobalHandle
GetTempFileNameA
GetTempPathA
lstrcpyA
lstrcpynA
lstrcmpA
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
DeleteFileA
GetCurrentThreadId
GetCommandLineA
HeapAlloc
SetFileTime
FreeLibrary
CloseHandle
GetModuleFileNameA
MultiByteToWideChar
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
LeaveCriticalSection
CreateFileA
FlushInstructionCache
GetCurrentProcess
GetProcAddress
WaitForSingleObject
CreateProcessA
GetModuleHandleA
GetStartupInfoA
ExitProcess
HeapReAlloc
HeapFree
GlobalAlloc
GetLastError
SetFileAttributesA
lstrlenA
FormatMessageA
LocalFree
LCMapStringW
BeginUpdateResourceA
EnterCriticalSection
UpdateResourceA
EndUpdateResourceA
LoadLibraryA
FindResourceA
SizeofResource
LoadResource
LockResource
FreeResource
HeapCreate
GetSystemInfo
lstrcatA
RaiseException
GetStringTypeW
GetStringTypeA
CreateDirectoryA
GetFileType
LCMapStringA
WideCharToMultiByte
IsBadCodePtr
IsBadWritePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
HeapSize
TerminateProcess
RtlUnwind
SetStdHandle
SetEndOfFile
GetFileAttributesA
GetStdHandle
user32
CharNextA
CharPrevA
MessageBoxA
SendMessageA
SetCursor
LoadCursorA
SetDlgItemTextA
GetDlgItemTextA
DialogBoxParamA
GetActiveWindow
SetWindowLongA
ShowWindow
DispatchMessageA
TranslateMessage
PeekMessageA
PostMessageA
GetDlgItem
LoadStringA
EndDialog
comdlg32
GetOpenFileNameA
GetSaveFileNameA
advapi32
CryptCreateHash
CryptHashData
CryptEncrypt
CryptDeriveKey
CryptDestroyKey
CryptSetKeyParam
CryptGetHashParam
CryptDecrypt
RegEnumKeyA
RegOpenKeyA
RegCloseKey
CryptAcquireContextA
CryptReleaseContext
CryptDestroyHash
shell32
FindExecutableA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
Sections
.text Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ