Static task
static1
Behavioral task
behavioral1
Sample
1e7dcbbe715187fb3a3f0335890126e8171d156902f2cc16e6b427424e9eab15.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1e7dcbbe715187fb3a3f0335890126e8171d156902f2cc16e6b427424e9eab15.exe
Resource
win10v2004-20220901-en
General
-
Target
1e7dcbbe715187fb3a3f0335890126e8171d156902f2cc16e6b427424e9eab15
-
Size
328KB
-
MD5
0ef6bf08341907d5498e5fcaad62a350
-
SHA1
d99cd709a6654fbadd7ad654e8da6a3491122d89
-
SHA256
1e7dcbbe715187fb3a3f0335890126e8171d156902f2cc16e6b427424e9eab15
-
SHA512
5d3bd16fe2f55c9c508e3252e69b3cf80e8134768fe94a78070dc16f0f53d06df761bad759c1922e73d8106e27a879bd3f1530f503a6c00db406be0ecd68f569
-
SSDEEP
6144:WIIEeZrRrke9QXbRp8oXFNlU7dHAY7WD:WS61DuTZUZHAY6D
Malware Config
Signatures
Files
-
1e7dcbbe715187fb3a3f0335890126e8171d156902f2cc16e6b427424e9eab15.exe windows x86
55ea8a3857e35f1710975e2a8251e8c2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
kernel32
GetWindowsDirectoryA
GetEnvironmentVariableA
lstrlenA
Sleep
GetLastError
SetFilePointer
WriteFile
ReadFile
SetEndOfFile
GetFileSize
FindClose
FindNextFileA
FindFirstFileA
CreateFileW
FindFirstFileW
MultiByteToWideChar
DeleteFileW
SetFileAttributesW
SetThreadPriority
SetPriorityClass
GetCurrentThread
GetCurrentProcess
GetVersionExA
HeapFree
HeapAlloc
GetVersion
CreateThread
GetSystemDefaultLangID
LockResource
LoadResource
SizeofResource
FindResourceA
GetSystemInfo
VirtualProtect
GetLocaleInfoA
FlushFileBuffers
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetTimeZoneInformation
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetFullPathNameA
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
VirtualQuery
InterlockedExchange
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
LCMapStringW
WideCharToMultiByte
LCMapStringA
SetStdHandle
GetStdHandle
SetHandleCount
GetCPInfo
GetOEMCP
WaitForSingleObject
TerminateThread
GetModuleHandleA
TerminateProcess
GetModuleFileNameA
SetCurrentDirectoryA
CreateFileA
GetDiskFreeSpaceA
FreeLibrary
GetSystemDirectoryA
LoadLibraryA
GetProcAddress
OpenProcess
ReadProcessMemory
CloseHandle
WritePrivateProfileStringA
GetLogicalDriveStringsA
SetFileAttributesA
DeleteFileA
lstrcmpA
lstrcpyA
GetPrivateProfileStringA
GetDriveTypeA
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetCurrentDirectoryA
GetACP
HeapSize
HeapReAlloc
ExitProcess
FileTimeToSystemTime
FileTimeToLocalFileTime
RtlUnwind
GetFileType
GetStartupInfoA
GetCommandLineA
user32
CreateWindowExA
SetWindowPos
DestroyWindow
LoadBitmapA
GetSystemMenu
EnableMenuItem
EnableWindow
SendDlgItemMessageA
DialogBoxParamA
EndDialog
GetSysColorBrush
GetWindowLongA
LoadCursorA
SetCursor
KillTimer
GetCursorPos
ScreenToClient
PtInRect
SetTimer
InvalidateRect
CallWindowProcA
GetDlgCtrlID
WindowFromPoint
LoadIconA
GetDlgItem
SetWindowLongA
SetDlgItemTextA
SetFocus
MessageBoxA
wsprintfA
GetParent
SetWindowTextA
SendMessageA
GetClientRect
gdi32
GetCurrentObject
DeleteObject
SelectObject
SetTextColor
SetBkMode
GetStockObject
GetObjectA
CreateFontIndirectA
CreatePatternBrush
advapi32
RegCloseKey
RegEnumKeyExA
RegQueryInfoKeyA
RegEnumValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegDeleteValueA
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
shell32
ShellExecuteA
shlwapi
SHDeleteKeyA
Sections
.text Size: 64KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 224KB - Virtual size: 240KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE