Static task
static1
Behavioral task
behavioral1
Sample
f7dd8166da29f408985f21ae46bc83775ad9720274273b3318d132612ce534d7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f7dd8166da29f408985f21ae46bc83775ad9720274273b3318d132612ce534d7.exe
Resource
win10v2004-20220812-en
General
-
Target
f7dd8166da29f408985f21ae46bc83775ad9720274273b3318d132612ce534d7
-
Size
2.6MB
-
MD5
762b612fada595496e12021bea0c41db
-
SHA1
2a2ea4e98350406077ad1850d85bb440b396f140
-
SHA256
f7dd8166da29f408985f21ae46bc83775ad9720274273b3318d132612ce534d7
-
SHA512
72689ac04d079444d08459ddb98073f8e5964ec37c6b8243878a195fd4743fe16e50533d5543869c74caa04d9ef7f42f76bd5120badbc3379e382632f630ace5
-
SSDEEP
49152:80b7cF6KwQylRjKfMBIcJRen22hQ+jzGVpQH1QkxlVQY0GaaBK5HEMHL5:80bwF6K1sRjKfjczptVK/YGaeK5
Malware Config
Signatures
Files
-
f7dd8166da29f408985f21ae46bc83775ad9720274273b3318d132612ce534d7.exe windows x86
9ced78ead3554b0d6ed4352414149c18
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
CreateServiceA
EqualSid
GetUserNameA
LockServiceDatabase
OpenProcessToken
QueryServiceConfig2A
RegDeleteKeyA
RegQueryInfoKeyA
RegQueryValueA
SetServiceStatus
kernel32
CloseHandle
CreateEventA
CreateFileA
CreateFileMappingA
CreateProcessA
DeleteCriticalSection
DeviceIoControl
DuplicateHandle
EnterCriticalSection
ExitProcess
ExitThread
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
FormatMessageA
FreeLibrary
GetCPInfo
GetConsoleCP
GetConsoleMode
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetFileSize
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcessHeap
GetShortPathNameA
GetSystemDirectoryA
GetSystemTimeAsFileTime
GetTempFileNameA
GetThreadTimes
GetTickCount
GetTimeZoneInformation
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalHandle
HeapAlloc
HeapFree
HeapSize
InterlockedExchange
IsBadCodePtr
IsBadWritePtr
LoadLibraryExA
LocalAlloc
LocalFree
LockResource
MultiByteToWideChar
OpenEventA
OutputDebugStringA
QueryPerformanceCounter
RaiseException
ReleaseMutex
RtlUnwind
SetCurrentDirectoryA
SetEnvironmentVariableA
SetEvent
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SizeofResource
Sleep
SystemTimeToFileTime
TlsAlloc
TlsSetValue
VirtualAlloc
VirtualFree
VirtualProtect
WideCharToMultiByte
WriteConsoleA
WriteFile
lstrcmpiA
lstrcpyA
lstrlenA
ole32
CoTaskMemRealloc
OleSaveToStream
WriteClassStm
user32
CallWindowProcA
CharPrevA
CheckMenuItem
DispatchMessageA
DrawFocusRect
EnableMenuItem
GetDlgCtrlID
GetDlgItemTextA
GetMessageA
GetSysColor
GetWindowLongA
GetWindowPlacement
IsWindowEnabled
IsWindowVisible
LoadStringA
MessageBoxA
MsgWaitForMultipleObjects
PeekMessageA
SetDlgItemTextA
SetMenu
SetWindowLongA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 32KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 6.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ