Static task
static1
Behavioral task
behavioral1
Sample
7e79b7dfb5a71c8fe9e8b2ddb1025e5b2334d692d23bac653345f027a846783c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7e79b7dfb5a71c8fe9e8b2ddb1025e5b2334d692d23bac653345f027a846783c.exe
Resource
win10v2004-20221111-en
General
-
Target
7e79b7dfb5a71c8fe9e8b2ddb1025e5b2334d692d23bac653345f027a846783c
-
Size
22KB
-
MD5
007a7c36ffc32883d110fcaf16540ef5
-
SHA1
c17771773749f4d7e0553b9b0270385e623254d8
-
SHA256
7e79b7dfb5a71c8fe9e8b2ddb1025e5b2334d692d23bac653345f027a846783c
-
SHA512
b3bf2389964e52ac24ff6e6558a3fbfbab37dbfeb62ec67d0e7f06b36b818ac9ffc7bd4cd378884c6d40acc663bb9be2a6798438894c306411eada4c5929cff7
-
SSDEEP
192:h6UhF6QnxguekB/Rbko3mbWbUfa3AQdHkvAChR7gDzqtnmqWzn70CiOZuHwMWb0Y:g8w383/p7dEfR7vtcEC5wrG0h7Hof
Malware Config
Signatures
Files
-
7e79b7dfb5a71c8fe9e8b2ddb1025e5b2334d692d23bac653345f027a846783c.exe windows x86
057818018261f458ef2539bcc83b9235
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
IsBadCodePtr
SetLastError
GetFileAttributesW
GetStdHandle
GetStartupInfoA
HeapCreate
SetEvent
GetModuleFileNameA
DeleteFileW
GetEnvironmentVariableA
MapViewOfFile
TlsGetValue
GetCommandLineW
GetACP
CreateFileA
HeapDestroy
Sleep
GetModuleHandleA
ReadFile
user32
DrawTextW
SetFocus
GetSysColor
GetWindowLongA
GetWindowInfo
GetClassInfoA
DispatchMessageA
DestroyMenu
DispatchMessageA
GetKeyState
FindWindowA
CallWindowProcW
IsZoomed
resutils
ClusWorkerStart
ClusWorkerStart
ClusWorkerStart
ClusWorkerStart
inetcpl.cpl
DllInstall
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 840KB - Virtual size: 840KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ