Static task
static1
Behavioral task
behavioral1
Sample
77cbabb414c2add2ee50b7a13927eab7e8734755fb13bc94572cf5b149607197.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
77cbabb414c2add2ee50b7a13927eab7e8734755fb13bc94572cf5b149607197.exe
Resource
win10v2004-20221111-en
General
-
Target
77cbabb414c2add2ee50b7a13927eab7e8734755fb13bc94572cf5b149607197
-
Size
4.5MB
-
MD5
282551eebcc0601e17d6ab702baed4af
-
SHA1
d1e9d6db96b768596388ab7959b57010e668183c
-
SHA256
77cbabb414c2add2ee50b7a13927eab7e8734755fb13bc94572cf5b149607197
-
SHA512
3bbd0e076db51d685d6f8dc2b84a94a01b0aef7a53a4bb438cc64603f8fc6806acbe23b577d60be5af8703383be64f271b95eb7f5f8568ca5595fe1505654850
-
SSDEEP
98304:FjX2TR/+9g+1wLgJf6PD3Nmn7AJEgLYXMKUCCCNYzQEr0WO0Yk8401bFmL1OVYIl:Y1+vJiPD3Nm7AJEgLYX8CNYzQEr0WO0G
Malware Config
Signatures
Files
-
77cbabb414c2add2ee50b7a13927eab7e8734755fb13bc94572cf5b149607197.exe windows x86
490b83949e585fc6504fdb8a60bc993a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
lstrlenA
Sleep
GetFileSize
ReadFile
SetFilePointer
DuplicateHandle
GetModuleHandleA
MultiByteToWideChar
TerminateThread
OpenProcess
IsBadReadPtr
SetLastError
GetVersionExA
FreeLibrary
WaitForSingleObject
ResumeThread
SetThreadContext
GetThreadContext
CreateEventA
SuspendThread
CopyFileA
GetSystemTime
FindClose
FindNextFileA
FindFirstFileA
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
GetSystemDefaultLangID
lstrcpyW
lstrlenW
CreateProcessA
MoveFileA
ExpandEnvironmentStringsA
GetWindowsDirectoryW
InitializeCriticalSection
GetLastError
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
InterlockedIncrement
InterlockedDecrement
SetUnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
IsBadWritePtr
HeapCreate
HeapDestroy
GetEnvironmentVariableA
HeapSize
HeapReAlloc
UnhandledExceptionFilter
HeapAlloc
TlsAlloc
GetCurrentThreadId
RaiseException
ExitProcess
GetVersion
UnmapViewOfFile
LoadLibraryA
GetProcAddress
CreateFileA
WriteFile
GetCurrentDirectoryA
GetCurrentProcessId
GetSystemDirectoryA
SetFileAttributesA
GetModuleFileNameA
VirtualProtect
VirtualAlloc
WinExec
CreateToolhelp32Snapshot
Process32First
Process32Next
Module32First
Module32Next
CloseHandle
GetCurrentProcess
TerminateProcess
DeleteFileA
GetCommandLineA
GetStartupInfoA
HeapFree
RtlUnwind
GetLocalTime
GetTimeZoneInformation
ExitThread
TlsGetValue
TlsSetValue
CreateThread
VirtualFree
lstrcpyA
CreateFileMappingA
MapViewOfFile
user32
EndDialog
MessageBoxA
GetWindowThreadProcessId
SystemParametersInfoA
GetWindow
GetClassNameA
IsWindow
GetTopWindow
IsWindowVisible
FindWindowA
GetWindowTextA
wsprintfA
LoadIconA
CheckDlgButton
EnableWindow
SetDlgItemTextA
GetDlgItemTextA
GetClassNameW
IsDlgButtonChecked
GetKeyboardLayoutNameA
GetKeyboardLayoutList
UnloadKeyboardLayout
ReleaseCapture
ClientToScreen
SetCursor
SetCapture
LoadBitmapA
LoadCursorA
WindowFromPoint
GetParent
PtInRect
GetWindowDC
GetWindowRect
OffsetRect
IsRectEmpty
ReleaseDC
DialogBoxParamA
GetClassInfoExA
RegisterClassExA
WaitForInputIdle
SendMessageA
PeekMessageA
TranslateMessage
DispatchMessageA
PostMessageA
GetDlgItem
gdi32
PatBlt
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegEnumKeyExA
RegCreateKeyA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegOpenKeyA
RegEnumValueA
shell32
ShellExecuteExA
ShellExecuteA
ws2_32
inet_addr
htons
connect
send
select
closesocket
socket
inet_ntoa
gethostbyname
WSAStartup
recv
__WSAFDIsSet
imm32
ImmGetDescriptionA
ImmIsIME
shlwapi
PathFindExtensionA
PathRemoveFileSpecA
PathFileExistsA
PathFindFileNameA
StrCatW
PathRenameExtensionA
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
Sections
.text Size: 176KB - Virtual size: 175KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3.2MB - Virtual size: 3.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text0 Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text1 Size: 1020KB - Virtual size: 1018KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ