Static task
static1
Behavioral task
behavioral1
Sample
b7c8e8c440699b1a3dbe5b0aae490ecd85874eebd7e267b722c4995bf5c7d599.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b7c8e8c440699b1a3dbe5b0aae490ecd85874eebd7e267b722c4995bf5c7d599.exe
Resource
win10v2004-20221111-en
General
-
Target
b7c8e8c440699b1a3dbe5b0aae490ecd85874eebd7e267b722c4995bf5c7d599
-
Size
796KB
-
MD5
6c6ee6fd276f6afeb94597fe137db85e
-
SHA1
22688c6621a9a70dc72cb074a0cb4cfc603e9998
-
SHA256
b7c8e8c440699b1a3dbe5b0aae490ecd85874eebd7e267b722c4995bf5c7d599
-
SHA512
935336d3915b895a0100e8892bf7cc34d13294a493919ba14851dc4d6889f91d4dd40fbf7a294e09889f7444afc0d27f79baea749b2acaa4fe3d4959ddc76984
-
SSDEEP
12288:VQI7vx6w7C8iN0NZvMvOKd+hc+vipL1gXTFZx5SPD4lP3wW/vvxap+:Omvvg2vMvOW11yTF7Jh39v5ap+
Malware Config
Signatures
Files
-
b7c8e8c440699b1a3dbe5b0aae490ecd85874eebd7e267b722c4995bf5c7d599.exe windows x86
088d116e3f25ac655e8ec0070da5de0b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
LoadTypeLi
kernel32
CreateMutexW
FreeLibrary
VirtualFree
GlobalLock
LCMapStringW
GetProcessHeap
SetEndOfFile
TlsGetValue
GetVersionExA
GetCommandLineA
GetCurrentProcessId
IsDebuggerPresent
HeapDestroy
GetLocaleInfoW
GetEnvironmentStrings
CompareStringW
SetHandleCount
GetCommandLineW
InterlockedExchange
DeleteFileW
GetStdHandle
GlobalUnlock
SetFilePointer
CreateDirectoryW
TlsFree
GetLocalTime
GetModuleHandleA
GetUserDefaultLCID
WaitForSingleObject
CreateProcessW
GetModuleFileNameW
CreateFileA
HeapFree
CompareStringA
GetStringTypeA
FindClose
GetFileSize
QueryPerformanceCounter
LoadLibraryA
GetVersion
TerminateProcess
InitializeCriticalSection
SetEnvironmentVariableA
WriteFile
LCMapStringA
CreateFileW
GetProcAddress
UnhandledExceptionFilter
HeapReAlloc
GetStartupInfoA
VirtualQuery
FreeEnvironmentStringsA
GetFullPathNameW
WideCharToMultiByte
SetLastError
LoadLibraryW
FreeEnvironmentStringsW
TlsSetValue
GlobalFree
GetStringTypeW
GetCurrentThreadId
HeapCreate
LeaveCriticalSection
GetLocaleInfoA
IsBadCodePtr
GetModuleHandleW
FlushFileBuffers
DeleteCriticalSection
InterlockedIncrement
HeapAlloc
WriteConsoleA
GlobalAlloc
GetEnvironmentStringsW
SetUnhandledExceptionFilter
Sleep
GetTimeZoneInformation
GetCurrentProcess
GetACP
GetModuleFileNameA
RaiseException
InterlockedDecrement
FindFirstFileW
GetSystemTime
GetVersionExW
VirtualAlloc
IsValidLocale
GetOEMCP
EnterCriticalSection
ReadFile
OpenMutexW
GetSystemTimeAsFileTime
GetCPInfo
GetLastError
GetTickCount
TlsAlloc
SetStdHandle
ExitProcess
MultiByteToWideChar
RtlUnwind
GetStartupInfoW
FindNextFileW
GetFileType
HeapSize
CloseHandle
comctl32
ImageList_Destroy
ImageList_DrawEx
InitCommonControlsEx
PropertySheetW
comdlg32
GetOpenFileNameA
GetFileTitleA
advapi32
RegEnumKeyExA
RegCreateKeyExA
RegCreateKeyA
ControlService
RegQueryValueExA
InitializeSecurityDescriptor
user32
DrawFocusRect
GetCursorPos
DestroyIcon
GetWindowThreadProcessId
UnpackDDElParam
OpenClipboard
EnableMenuItem
BringWindowToTop
IsWindow
IsClipboardFormatAvailable
DefWindowProcW
EndDeferWindowPos
GetNextDlgTabItem
SetActiveWindow
SetWindowPlacement
ScrollWindow
GetWindowTextLengthW
SetRect
GetMenuItemID
GetNextDlgGroupItem
TrackPopupMenu
SetFocus
DrawTextW
LoadIconW
wsprintfW
ReleaseDC
RegisterClassExW
ScreenToClient
LoadAcceleratorsW
CreatePopupMenu
LoadStringW
DestroyMenu
LoadCursorW
EndDialog
GetWindowRect
CreateWindowExW
SetForegroundWindow
SetMenuDefaultItem
ShowWindow
GetSysColor
GetDesktopWindow
InsertMenuW
FillRect
RedrawWindow
SetMenuItemInfoW
ValidateRect
DestroyAcceleratorTable
RemoveMenu
SystemParametersInfoW
GetActiveWindow
MessageBeep
RegisterClassW
EmptyClipboard
CopyAcceleratorTableW
DeferWindowPos
GetTopWindow
GetDlgCtrlID
EnableWindow
GetMessageTime
GetKeyState
SetCursorPos
LoadBitmapW
InflateRect
GetClassLongW
AppendMenuW
SetScrollInfo
GetWindowDC
InvalidateRect
BeginDeferWindowPos
LockWindowUpdate
ReleaseCapture
GetDlgItem
DestroyWindow
PostMessageW
TranslateMDISysAccel
IsWindowEnabled
GetFocus
MessageBoxW
SendMessageW
CopyRect
DeleteMenu
GetWindow
PostQuitMessage
ole32
CoLockObjectExternal
OleGetClipboard
OleDuplicateData
CoTaskMemFree
OleUninitialize
CreateStreamOnHGlobal
GetRunningObjectTable
StgOpenStorageOnILockBytes
OleInitialize
OleRun
CoInitialize
CoRegisterMessageFilter
shell32
DragFinish
ShellExecuteA
shlwapi
PathBuildRootA
PathIsUNCServerA
PathRemoveFileSpecA
PathIsUNCA
PathRemoveBackslashA
PathIsRootA
PathFileExistsA
PathGetDriveNumberA
SHDeleteKeyA
PathIsDirectoryA
PathIsUNCServerShareA
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 472KB - Virtual size: 470KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 140KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ