Static task
static1
Behavioral task
behavioral1
Sample
7a198ac2267f53114f2aabb7e0b0f59b11a6469e523eabed71372f6bfdb32a5c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7a198ac2267f53114f2aabb7e0b0f59b11a6469e523eabed71372f6bfdb32a5c.exe
Resource
win10v2004-20220812-en
General
-
Target
7a198ac2267f53114f2aabb7e0b0f59b11a6469e523eabed71372f6bfdb32a5c
-
Size
87KB
-
MD5
2416640239895471875ff70b48bf0d00
-
SHA1
6cd0dbce4abc5b3d46449bb4cd5ebf9350b58e62
-
SHA256
7a198ac2267f53114f2aabb7e0b0f59b11a6469e523eabed71372f6bfdb32a5c
-
SHA512
a0c77e1f452d96fc798cced4ae83ec17e63479314ba63bffd8adc9c6253563ac6abf208236039a454745406360c7daf1ee965facbd62bc33d59289a8c5353256
-
SSDEEP
1536:0a/boULz3wemua9r2cU8t6sVe5P1iUhv1kr5uHfrKnG3pnej6mQjMMMMMMg8A:J/booweDa9r48gvqtniLjMMMMMMFA
Malware Config
Signatures
Files
-
7a198ac2267f53114f2aabb7e0b0f59b11a6469e523eabed71372f6bfdb32a5c.exe windows x86
56c900af7eb2c5a3af8cadc51353f2e9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
wsprintfA
ReleaseDC
OemToCharA
MessageBoxA
GetSystemMetrics
GetDC
GetAsyncKeyState
FindWindowA
kernel32
lstrcpyW
lstrlenW
lstrlenA
lstrcpynA
lstrcpyA
lstrcmpiA
CloseHandle
CopyFileA
CreateDirectoryA
CreateFileA
CreateFileMappingA
CreateMutexA
CreateProcessA
CreateThread
DeleteFileA
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FreeLibrary
FreeResource
GetComputerNameA
GetComputerNameW
GetDiskFreeSpaceExA
GetDriveTypeA
GetEnvironmentVariableA
GetFileSize
GetLastError
GetLocalTime
GetLocaleInfoA
GetLogicalDrives
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
GetProcAddress
GetProcessHeap
GetSystemDefaultLangID
GetSystemDirectoryA
GetTempPathA
GetTickCount
GetVersionExA
GetWindowsDirectoryA
GlobalMemoryStatusEx
HeapAlloc
HeapFree
IsBadCodePtr
IsBadReadPtr
IsBadWritePtr
LoadLibraryA
LoadResource
LockResource
MapViewOfFile
MoveFileExA
MultiByteToWideChar
OpenProcess
ReadFile
RtlMoveMemory
RtlZeroMemory
SetCurrentDirectoryA
SetEndOfFile
SetErrorMode
SetFileAttributesA
SetFilePointer
SizeofResource
Sleep
UnmapViewOfFile
VerLanguageNameA
VirtualAlloc
VirtualFree
WideCharToMultiByte
WriteFile
lstrcatA
lstrcatW
lstrcmpA
gdi32
GetDeviceCaps
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 242KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE