Static task
static1
Behavioral task
behavioral1
Sample
07c0fc8ad1c61c9f856c4cb55a6121f7dd3d8059e93243ec0748ee68e90b19ca.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
07c0fc8ad1c61c9f856c4cb55a6121f7dd3d8059e93243ec0748ee68e90b19ca.exe
Resource
win10v2004-20220812-en
General
-
Target
07c0fc8ad1c61c9f856c4cb55a6121f7dd3d8059e93243ec0748ee68e90b19ca
-
Size
592KB
-
MD5
710aab8ae5f5d9c171e0f3a936496956
-
SHA1
891be7dffe88e2b9b749278a091fab0354a11ac3
-
SHA256
07c0fc8ad1c61c9f856c4cb55a6121f7dd3d8059e93243ec0748ee68e90b19ca
-
SHA512
78768baf7f86583b37dea3ecb628c5bf3bd4d5b7ed789cb4e2bc173ee4984e071984cd6e562af59ca7fa0e16100acdba1b08c6567b38d7e1c2ae4e0333e559d6
-
SSDEEP
12288:MX6M8rfdViHuabOdEk0/SxzPhFWKhYggckkjiOVGqn60vDPsB:MKpfdViHFbOdEk0/SxzPhFWKhYggxX+a
Malware Config
Signatures
Files
-
07c0fc8ad1c61c9f856c4cb55a6121f7dd3d8059e93243ec0748ee68e90b19ca.exe windows x86
14dc34463074e45ac5b3513489ae6051
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_Add
ImageList_Create
kernel32
GetModuleHandleA
LockResource
SizeofResource
LoadResource
FindResourceA
LocalFree
FindClose
FindFirstFileA
GetTickCount
GetDriveTypeA
_lread
SetLastError
_lwrite
_llseek
GetWindowsDirectoryA
GetVersionExA
FindNextFileW
CreateFileW
FindFirstFileW
FlushFileBuffers
DeleteCriticalSection
FreeLibrary
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
GetStartupInfoA
GetProcessWorkingSetSize
GetProcessTimes
GetThreadTimes
GlobalMemoryStatus
GetProcessHeap
GetCurrentThreadId
InitializeCriticalSection
ExitProcess
TerminateProcess
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
GetFileType
SetFilePointer
FileTimeToLocalFileTime
FindNextFileA
ExitThread
ResumeThread
CreateThread
GetCommandLineA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetProcAddress
LCMapStringW
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
HeapSize
SetHandleCount
GetStdHandle
SetStdHandle
SetEndOfFile
GetFullPathNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
RtlUnwind
InterlockedExchange
VirtualQuery
GetLocaleInfoA
GetCPInfo
VirtualProtect
GetSystemInfo
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
GetTimeZoneInformation
CompareStringA
CompareStringW
SetEnvironmentVariableA
CreateDirectoryA
GetSystemDirectoryA
GetModuleFileNameA
GetCurrentDirectoryA
GetLastError
CreateMutexA
CloseHandle
Sleep
DeviceIoControl
GetLogicalDrives
SystemTimeToFileTime
GetLocalTime
GetTimeFormatW
GetDateFormatW
GetFileSize
GetModuleFileNameW
ReadFile
WriteFile
GetFileTime
SetFileTime
CreateFileA
GetCurrentThread
GetCurrentProcess
QueryPerformanceFrequency
QueryPerformanceCounter
SetFilePointerEx
QueryDosDeviceA
MultiByteToWideChar
WideCharToMultiByte
FormatMessageW
GetCurrentProcessId
DefineDosDeviceA
VirtualUnlock
DeleteFileA
VirtualLock
FileTimeToSystemTime
LCMapStringA
user32
GetDC
EndPaint
GetDialogBaseUnits
GetClientRect
DefWindowProcA
BeginPaint
GetUpdateRect
RegisterClassA
LoadIconA
UnregisterClassA
DefDlgProcA
SetCursor
LoadCursorA
GetClassNameA
GetDlgCtrlID
EnumChildWindows
SetWindowLongA
FindWindowExA
GetKeyState
SendMessageTimeoutA
MessageBoxA
GetWindowLongA
GetSystemMenu
SystemParametersInfoW
GetClassInfoA
UnhookWindowsHookEx
CallNextHookEx
GetCaretPos
GetQueueStatus
GetProcessWindowStation
GetOpenClipboardWindow
GetMessageTime
GetInputState
GetFocus
GetDesktopWindow
GetClipboardViewer
GetClipboardOwner
GetCapture
GetActiveWindow
SetWindowsHookExA
ReleaseDC
EnumWindows
CreatePopupMenu
AppendMenuW
AppendMenuA
GetMessagePos
TrackPopupMenu
DestroyMenu
GetWindowRect
DrawMenuBar
PostMessageA
IsWindowEnabled
SystemParametersInfoA
GetCursorPos
wsprintfW
UnregisterHotKey
RegisterHotKey
IsWindowVisible
SetMenuItemInfoW
ShowWindow
MessageBeep
LoadBitmapA
GetDlgItemInt
DialogBoxParamA
SetDlgItemInt
SetForegroundWindow
GetMenu
EnableMenuItem
LoadImageA
DestroyIcon
SetDlgItemTextA
GetDlgItemTextA
SetFocus
MessageBoxW
SendDlgItemMessageW
SendDlgItemMessageA
SetWindowTextA
DialogBoxParamW
InvalidateRect
GetWindowTextA
GetWindowTextLengthA
GetWindowTextLengthW
SetWindowTextW
EnableWindow
SetTimer
GetParent
KillTimer
EndDialog
GetDlgItem
SendMessageA
SendMessageW
GetAsyncKeyState
gdi32
GetStockObject
CreatePen
MoveToEx
LineTo
GetDeviceCaps
SelectObject
CreateFontIndirectW
DeleteObject
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
CryptAcquireContextA
CryptGenRandom
CryptReleaseContext
OpenServiceA
QueryServiceStatus
ControlService
OpenSCManagerA
CreateServiceA
CloseServiceHandle
StartServiceA
DeleteService
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
shell32
Shell_NotifyIconA
DragAcceptFiles
DragFinish
DragQueryFileA
ShellExecuteA
ShellExecuteW
SHGetPathFromIDListA
SHBrowseForFolderW
SHGetMalloc
SHGetFileInfoA
SHChangeNotify
SHGetFolderPathA
Shell_NotifyIconW
Sections
.text Size: 237KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 259KB - Virtual size: 259KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ