Static task
static1
Behavioral task
behavioral1
Sample
7fc3702ce698f308de5f5f89dbcab960321b040b4951cc7d90b19ae6989298a1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7fc3702ce698f308de5f5f89dbcab960321b040b4951cc7d90b19ae6989298a1.exe
Resource
win10v2004-20220812-en
General
-
Target
7fc3702ce698f308de5f5f89dbcab960321b040b4951cc7d90b19ae6989298a1
-
Size
310KB
-
MD5
6e0e890de5a0d08ddcaaf2d22731f9df
-
SHA1
4d357aa3cd76a138177ff7d449be3c34e976300f
-
SHA256
7fc3702ce698f308de5f5f89dbcab960321b040b4951cc7d90b19ae6989298a1
-
SHA512
0e0154bd3c368816f9fd67b87356a03b9f47a8854ade1b253a1f5f18f091a0f3d03247e890943a562cccb82ec1e7fda969d9de0ddabfbefd1ed3a0b6d8b9044c
-
SSDEEP
6144:lhDGwTgVFhAUClRNYgzWC+UrxVw0o7tTMoUkKxFyNStNe672hK:lh6w4umoWKGnTMoUkVctNsc
Malware Config
Signatures
Files
-
7fc3702ce698f308de5f5f89dbcab960321b040b4951cc7d90b19ae6989298a1.exe windows x86
17a3798c38d2df395bc52d8d379ecd88
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
VarUI4FromStr
GetErrorInfo
LoadRegTypeLi
SysStringByteLen
SysAllocString
VariantInit
LoadTypeLi
SysFreeString
SysStringLen
SysAllocStringByteLen
VariantCopy
UnRegisterTypeLi
DispCallFunc
RegisterTypeLi
VariantClear
user32
OpenClipboard
EmptyClipboard
RegisterWindowMessageA
SetClipboardData
LoadImageA
TranslateAcceleratorA
LoadMenuA
TrackPopupMenu
IsZoomed
CallNextHookEx
EnableMenuItem
GetCursorPos
GetWindowThreadProcessId
SetMenuDefaultItem
PostMessageA
GetSubMenu
SetWindowRgn
DrawIconEx
LoadAcceleratorsA
CopyRect
SetFocus
GetParent
EnableWindow
GetWindowRect
SetForegroundWindow
ReleaseDC
RedrawWindow
InflateRect
GetSystemMetrics
SendMessageA
PostQuitMessage
RemoveMenu
SetWindowsHookExA
UpdateWindow
IsWindow
MapDialogRect
SetWindowPos
GetDC
GetClientRect
CloseClipboard
DrawTextA
DestroyIcon
CharNextA
GetForegroundWindow
AttachThreadInput
FindWindowA
GetDesktopWindow
UnhookWindowsHookEx
LoadIconA
IsRectEmpty
advapi32
CopySid
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetSidLengthRequired
RegDeleteValueA
RegNotifyChangeKeyValue
InitializeSid
MakeSelfRelativeSD
GetSecurityDescriptorControl
RegOpenKeyExA
RegSetValueExA
RegQueryInfoKeyA
GetSecurityDescriptorGroup
OpenProcessToken
GetSecurityDescriptorOwner
GetSecurityDescriptorLength
RegEnumKeyExA
RegQueryValueExA
GetSecurityDescriptorSacl
GetLengthSid
MakeAbsoluteSD
GetSidSubAuthority
EqualSid
IsValidSid
RegCreateKeyExA
GetTokenInformation
SetSecurityDescriptorDacl
RegDeleteKeyA
RegCloseKey
ole32
CLSIDFromProgID
CoTaskMemRealloc
CoRegisterClassObject
CoTaskMemAlloc
CoFreeUnusedLibraries
StringFromCLSID
CoUninitialize
CoInitializeSecurity
CoRevokeClassObject
CoCreateInstance
StringFromGUID2
OleRun
OleUninitialize
CoTaskMemFree
CoInitializeEx
CoInitialize
CLSIDFromString
gdi32
CreateRectRgnIndirect
CombineRgn
CreateRectRgn
GetTextExtentExPointA
GetObjectA
SetRectRgn
CreateFontIndirectA
shlwapi
PathFindExtensionA
kernel32
lstrcpyA
GetModuleHandleA
GetProcessHeap
HeapReAlloc
GetTimeFormatA
lstrcatA
lstrcmpiA
HeapAlloc
lstrlenA
FindClose
LocalFree
SetPriorityClass
FindNextFileA
OpenProcess
IsDBCSLeadByte
WaitForMultipleObjects
HeapSize
FindResourceExA
ResetEvent
lstrlenW
GetSystemTimeAsFileTime
LockResource
DeleteFileA
GetThreadLocale
lstrcmpA
DeleteCriticalSection
GetACP
FileTimeToSystemTime
CreateThread
GlobalAlloc
FindResourceA
FormatMessageA
RemoveDirectoryA
HeapDestroy
WaitForSingleObject
LoadLibraryExA
CloseHandle
SystemTimeToFileTime
WideCharToMultiByte
FreeLibrary
GetUserDefaultLangID
SizeofResource
LocalAlloc
lstrcpynA
LeaveCriticalSection
SetLastError
RaiseException
CreateMutexA
EnterCriticalSection
OpenEventA
ReleaseMutex
HeapFree
CreateEventA
GlobalUnlock
FindFirstFileA
SetProcessWorkingSetSize
GlobalLock
GetCurrentThreadId
GetDateFormatA
LoadResource
IsValidCodePage
VirtualAllocEx
shell32
ShellExecuteA
Shell_NotifyIconA
userenv
GetProfileType
UnloadUserProfile
GetDefaultUserProfileDirectoryW
GetProfilesDirectoryA
DestroyEnvironmentBlock
GetAppliedGPOListA
ddrawex
DllUnregisterServer
DllCanUnloadNow
Sections
.text Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 263KB - Virtual size: 265KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ