Static task
static1
Behavioral task
behavioral1
Sample
7fdfbb209354ae3a37fa77b1b838a8f0180065b4f7438eff1e6fb8d42c3879c9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7fdfbb209354ae3a37fa77b1b838a8f0180065b4f7438eff1e6fb8d42c3879c9.exe
Resource
win10v2004-20220812-en
General
-
Target
7fdfbb209354ae3a37fa77b1b838a8f0180065b4f7438eff1e6fb8d42c3879c9
-
Size
110KB
-
MD5
11c1707b70b5b7c1f20229fdc54ce680
-
SHA1
f145c117e30a5ee66680655531df98c6909e5d4f
-
SHA256
7fdfbb209354ae3a37fa77b1b838a8f0180065b4f7438eff1e6fb8d42c3879c9
-
SHA512
47ccd1803160b03d4f382f19c1a37e5052a5d2055bd1cf14b5a1e180e549682ab5e90111edcbdf2a61015530f0d795f45aed981120ac5eacce0b7b408f180751
-
SSDEEP
1536:AUAdaM1qL7ZpRlu7XqCvO1/WYBpR6kS/Vqy9DhAobOBUFQX1nyz:A9djM3u7Xq1BPy3hoUFkpy
Malware Config
Signatures
Files
-
7fdfbb209354ae3a37fa77b1b838a8f0180065b4f7438eff1e6fb8d42c3879c9.exe windows x86
6854221314b19798666d8ca9c462767b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
FindTextA
GetSaveFileNameA
ChooseColorA
GetFileTitleA
user32
SetScrollInfo
RegisterWindowMessageA
CreatePopupMenu
LoadBitmapA
OpenClipboard
CheckMenuItem
DrawIconEx
GetForegroundWindow
GetSystemMenu
GetDesktopWindow
SetActiveWindow
GetWindow
MapVirtualKeyA
CloseClipboard
OffsetRect
SetForegroundWindow
GetWindowRect
GetKeyboardState
SetTimer
GetMessagePos
GetLastActivePopup
TrackPopupMenu
SetWindowTextA
OemToCharA
EnableMenuItem
IsDialogMessageW
SetCapture
SendMessageW
GetKeyNameTextA
DestroyWindow
CharToOemA
DispatchMessageA
EnableScrollBar
DrawTextA
SendMessageA
IsDialogMessageA
GetSysColorBrush
UpdateWindow
EnableWindow
CreateMenu
ReleaseCapture
CharNextW
InsertMenuItemA
SetWindowPlacement
GetCapture
IsIconic
EndPaint
PeekMessageW
SetScrollRange
PostMessageA
GetSubMenu
DefWindowProcA
FillRect
ScrollWindow
UnhookWindowsHookEx
GetIconInfo
GetPropA
GetKeyboardLayoutList
GetWindowLongW
PtInRect
DestroyMenu
RemovePropA
IsWindow
GetWindowDC
GetMenuStringA
MessageBeep
LoadCursorA
SetCursor
DestroyCursor
MapWindowPoints
EqualRect
GetParent
LoadIconA
BeginPaint
WaitMessage
DrawMenuBar
TranslateMessage
CharLowerA
MessageBoxA
EmptyClipboard
GetScrollInfo
SetClassLongA
DrawFrameControl
DrawAnimatedRects
GetWindowLongA
GetScrollRange
GetClassInfoA
GetDCEx
CallNextHookEx
SetWindowLongW
SystemParametersInfoA
InflateRect
SetScrollPos
GetClassNameA
SetClipboardData
IntersectRect
CreateIcon
KillTimer
ShowWindow
GetSysColor
GetFocus
DestroyIcon
EnumWindows
TranslateMDISysAccel
IsWindowUnicode
MsgWaitForMultipleObjects
ScreenToClient
GetMenuItemInfoA
GetMenuItemCount
ShowOwnedPopups
SetPropA
wsprintfA
GetMenuItemID
CharLowerBuffA
RemoveMenu
DispatchMessageW
GetTopWindow
GetClientRect
ActivateKeyboardLayout
RegisterClassA
GetWindowPlacement
GetKeyState
IsChild
GetWindowTextA
FrameRect
IsWindowEnabled
ClientToScreen
LoadStringA
UnregisterClassA
SetRect
SetWindowsHookExA
CharUpperBuffA
EnumChildWindows
DrawIcon
GetCursorPos
GetScrollPos
IsZoomed
EnumThreadWindows
CreateWindowExA
GetMenu
GetWindowThreadProcessId
PostQuitMessage
GetKeyboardLayoutNameA
GetClipboardData
SetWindowPos
GetClassLongA
IsWindowVisible
InsertMenuA
SetParent
InvalidateRect
MoveWindow
DrawEdge
LoadKeyboardLayoutA
GetMenuState
CallWindowProcA
RedrawWindow
DefMDIChildProcA
SetFocus
PeekMessageA
CharNextA
GetCursor
FindWindowA
GetDlgItem
GetActiveWindow
GetKeyboardType
IsRectEmpty
SetMenuItemInfoA
RegisterClipboardFormatA
GetDC
WindowFromPoint
DefFrameProcA
GetKeyboardLayout
shell32
SHGetDesktopFolder
SHGetFolderPathA
DragQueryFileA
Shell_NotifyIconA
shlwapi
PathIsDirectoryA
PathFileExistsA
SHDeleteKeyA
SHQueryInfoKeyA
gdi32
SetPixel
CreateBrushIndirect
GetRgnBox
GetPaletteEntries
CreateDIBSection
GetDIBits
GetCurrentPositionEx
SelectPalette
GetObjectA
advapi32
RegEnumKeyExA
RegEnumValueA
RegOpenKeyExA
RegLoadKeyA
kernel32
GetEnvironmentStrings
SizeofResource
VirtualAlloc
FreeResource
GetModuleHandleA
GetOEMCP
lstrlenA
LoadLibraryA
GetProcessHeap
GetLastError
ExitProcess
GetVersionExA
GetThreadLocale
LocalFree
VirtualAllocEx
GetFullPathNameA
WideCharToMultiByte
GetProcAddress
version
GetFileVersionInfoSizeA
VerFindFileA
Sections
.text Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 79KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 267B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ