Static task
static1
Behavioral task
behavioral1
Sample
7d173da7c6404e1e0dec3d09cbdb9c059ec1ad40ae8dbb0140d2dc7952107f38.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7d173da7c6404e1e0dec3d09cbdb9c059ec1ad40ae8dbb0140d2dc7952107f38.exe
Resource
win10v2004-20220901-en
General
-
Target
7d173da7c6404e1e0dec3d09cbdb9c059ec1ad40ae8dbb0140d2dc7952107f38
-
Size
133KB
-
MD5
02c3d2552512284c2e367031da90f570
-
SHA1
5fd9bdd6063f9413572f8cd76473ff938e89d628
-
SHA256
7d173da7c6404e1e0dec3d09cbdb9c059ec1ad40ae8dbb0140d2dc7952107f38
-
SHA512
03328be57fabc3b0f675a2c1601a4e5b128a3ef68498afb9a74336108ec3df3af0bd9969a55e568dabf7ec6627932a958f952975bbef05a34bb063c9c7d84702
-
SSDEEP
3072:QwU6zTagJ+f7MF2iTjkT6aFao5alUUmsgzpUa1i+Vb2zN6Y1fqrPWJs:Qwd+gYf7MIiTjkei4UUmsgtUSi+R2AX1
Malware Config
Signatures
Files
-
7d173da7c6404e1e0dec3d09cbdb9c059ec1ad40ae8dbb0140d2dc7952107f38.exe windows x86
842bc91b21c349412d1ae664afb9fada
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetAsyncKeyState
MessageBoxW
DispatchMessageW
GetParent
EnableWindow
GetCursorPos
DestroyWindow
GetSystemMetrics
RegisterClassExW
ShowWindow
RegisterWindowMessageW
IsIconic
LoadCursorW
LoadAcceleratorsW
LoadIconW
GetWindowPlacement
UnregisterClassA
SetTimer
SetFocus
FillRect
TranslateMessage
SetRect
GetWindowRect
MessageBeep
SetWindowLongW
IsWindow
SystemParametersInfoW
PeekMessageW
EndPaint
SendMessageA
KillTimer
WaitMessage
MoveWindow
OffsetRect
CharNextW
GetMessageW
PostThreadMessageW
TranslateAcceleratorW
MessageBoxA
GetWindowLongW
LoadCursorA
SendMessageW
GetFocus
SetCursor
BeginPaint
PostQuitMessage
GetClientRect
SetWindowPos
GetClassNameW
UpdateWindow
DestroyIcon
advapi32
RegQueryValueExA
RegCloseKey
RegDeleteKeyW
RegOpenKeyExW
RegOpenKeyExA
RegSetValueExW
RegEnumKeyExW
RegQueryValueExW
RegDeleteValueW
RegCreateKeyExW
RegQueryInfoKeyW
sensapi
IsNetworkAlive
kernel32
SetEvent
GetCurrentProcess
lstrlenW
GetFileAttributesW
GetTickCount
CreateEventW
CreateThread
SetErrorMode
LoadLibraryW
FindResourceW
TlsGetValue
QueryPerformanceCounter
lstrcmpiW
FormatMessageA
GetACP
GetVersion
InterlockedCompareExchange
ProcessIdToSessionId
GetTempFileNameA
SizeofResource
GetModuleHandleA
HeapAlloc
InitializeCriticalSection
GetCurrentProcessId
GetProcessHeap
LoadLibraryExW
CreateProcessA
GetSystemDirectoryW
GetVersionExA
GetModuleFileNameW
IsDebuggerPresent
AddAtomW
RaiseException
InterlockedExchange
MultiByteToWideChar
CloseHandle
Sleep
ExitProcess
GetProcAddress
GetCurrentThreadId
HeapFree
ExitProcess
DeleteCriticalSection
LoadLibraryA
LoadResource
LocalFree
UnhandledExceptionFilter
TerminateProcess
GetLocaleInfoA
GetCommandLineW
OutputDebugStringA
GetModuleHandleW
GetTempPathA
VirtualProtect
GetThreadLocale
SetUnhandledExceptionFilter
WaitForSingleObject
LocalAlloc
GetSystemTimeAsFileTime
GetLastError
SetLastError
GetStartupInfoW
crypt32
CertEnumSystemStoreLocation
CryptMsgGetParam
ole32
CoCreateInstance
RevokeDragDrop
CoRegisterClassObject
OleFlushClipboard
CoTaskMemRealloc
OleGetClipboard
CoTaskMemFree
StringFromGUID2
CoTaskMemAlloc
OleSetClipboard
RegisterDragDrop
CoRevokeClassObject
CoRegisterMessageFilter
OleUninitialize
Sections
.text Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ