Static task
static1
Behavioral task
behavioral1
Sample
76956bf2dab2129535e9d933a3a90e93932643097b678c2b9c58c1fe057e8891.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
76956bf2dab2129535e9d933a3a90e93932643097b678c2b9c58c1fe057e8891.exe
Resource
win10v2004-20220812-en
General
-
Target
76956bf2dab2129535e9d933a3a90e93932643097b678c2b9c58c1fe057e8891
-
Size
320KB
-
MD5
37b2b0151ad21b33180f640221879f0a
-
SHA1
b22368e4c505502d9dfbf0663ee47b387eb8b084
-
SHA256
76956bf2dab2129535e9d933a3a90e93932643097b678c2b9c58c1fe057e8891
-
SHA512
6b3e48d7b40ff7865d0d9b1219e35a55ca82fab5b985c50db01440304136599b297ba26a53d066bf4fe807d42fc883c4bcf2ffa5b5601b195288059e1e810679
-
SSDEEP
6144:WaexuXxUoYeIefIL6xyHdsWd+pyToHPfE2Y/xSYLbqQb85PD0HcN:LeMYFsu4pBHX6SGHA5PI8
Malware Config
Signatures
Files
-
76956bf2dab2129535e9d933a3a90e93932643097b678c2b9c58c1fe057e8891.exe windows x86
8262b65b3bd2e7fca038ba4375962bf0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProfileStringA
GlobalUnlock
GlobalAlloc
GlobalLock
CreateFileA
GlobalFree
RtlZeroMemory
CreateThread
GetCPInfo
FlushFileBuffers
RaiseException
GetLocaleInfoA
LoadLibraryA
VirtualAlloc
GetStringTypeW
GetStringTypeA
GetProcAddress
LCMapStringW
LCMapStringA
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
WriteFile
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetLastError
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
GetCurrentThreadId
DeleteCriticalSection
GetFileType
GetStdHandle
SetHandleCount
GetOEMCP
GetACP
GetModuleHandleA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
InterlockedIncrement
InterlockedDecrement
ExitProcess
GetVersion
lstrlenA
GetCommandLineA
GetStartupInfoA
GetDriveTypeA
Sleep
MultiByteToWideChar
lstrcpyA
GetDiskFreeSpaceA
DeviceIoControl
lstrcmpiA
GetWindowsDirectoryA
lstrcatA
GetProcessHeap
HeapAlloc
SetFilePointer
GetLocaleInfoW
SetStdHandle
GetVolumeInformationA
WideCharToMultiByte
CloseHandle
HeapFree
lstrcmpA
user32
GetWindowTextA
MessageBoxA
LoadStringA
EnumWindows
SetForegroundWindow
RegisterClassA
DefDlgProcA
LoadIconA
LoadCursorA
WinHelpA
ShowWindow
SendDlgItemMessageA
GetWindowLongA
GetDlgItem
SetWindowLongA
SetDlgItemTextA
EndDialog
SetFocus
DialogBoxParamA
LoadBitmapA
FillRect
DrawTextA
UpdateWindow
GetDC
ReleaseDC
GetClientRect
DefWindowProcA
UnregisterClassA
SetTimer
LoadImageA
PostMessageA
wsprintfA
CreateDialogParamA
PeekMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
MsgWaitForMultipleObjects
DestroyWindow
CheckDlgButton
IsDlgButtonChecked
EnableWindow
GetDesktopWindow
GetWindowRect
MoveWindow
SetCursor
GetParent
InvalidateRect
CallWindowProcA
GetSysColor
DrawIconEx
DrawFocusRect
BeginPaint
EndPaint
SendMessageA
gdi32
CreateSolidBrush
BitBlt
DeleteDC
GetStockObject
GetObjectA
SelectObject
StretchBlt
SetBkMode
ExtTextOutA
CreateCompatibleDC
CreateBitmap
CreateCompatibleBitmap
SetBkColor
DeleteObject
GetTextExtentPoint32A
SetTextColor
advapi32
RegEnumValueA
RegDeleteValueA
RegSetValueExA
RegCloseKey
RegEnumKeyExA
RegQueryValueExA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegOpenKeyA
shell32
ExtractIconExA
ShellExecuteA
SHGetFileInfoA
ole32
CoTaskMemFree
CLSIDFromString
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemAlloc
comctl32
ord17
PropertySheetA
CreatePropertySheetPageA
shlwapi
StrStrIA
Sections
.text Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 192KB - Virtual size: 1.3MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE