Static task
static1
Behavioral task
behavioral1
Sample
a177e2335d4f100fe71f38ff217fc74d1770d87634a1215bfceff9535d730c40.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a177e2335d4f100fe71f38ff217fc74d1770d87634a1215bfceff9535d730c40.exe
Resource
win10v2004-20220812-en
General
-
Target
a177e2335d4f100fe71f38ff217fc74d1770d87634a1215bfceff9535d730c40
-
Size
244KB
-
MD5
7f89ca740afefd611db95be3087679a1
-
SHA1
a287a3e5c5ef1bca6cbca4813acac55f16006d0c
-
SHA256
a177e2335d4f100fe71f38ff217fc74d1770d87634a1215bfceff9535d730c40
-
SHA512
1a2a5e24c0a6064c82526be88c6bc493983e3e32fd68c8bfbca85522d64b9952c35e058e3cca80cd9ae7e1ab0791930712958e4597671bcd828ba216765202ba
-
SSDEEP
3072:7L7zw9cqihXE+ILDz+PywWbMrF1RNcGk+HhzgcTASJp7rbxjy0XNnKyGD2B3t0jg:Xnwqqi5tYkyZM5FhFzgcbnF9XNnKxq
Malware Config
Signatures
Files
-
a177e2335d4f100fe71f38ff217fc74d1770d87634a1215bfceff9535d730c40.exe windows x86
dab2a3f90129707ddbfee9ac1804c2bf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MapWindowPoints
PostQuitMessage
IsWindow
EndPaint
GetDC
GetCursorPos
ReleaseDC
DestroyWindow
GetMessageA
GetParent
ShowWindow
SetCapture
PeekMessageA
SetWindowPos
TranslateMessage
LoadStringA
EnableMenuItem
RegisterClassA
GetWindowLongA
SetTimer
FillRect
DispatchMessageA
SetFocus
BeginPaint
KillTimer
DefWindowProcA
GetSystemMetrics
GetWindowRect
PostMessageA
ReleaseCapture
SetWindowLongA
GetSubMenu
CreateWindowExA
GetDlgItem
ScreenToClient
LoadCursorA
LoadIconA
GetDesktopWindow
SetForegroundWindow
EndDialog
MessageBoxA
GetSysColor
SystemParametersInfoA
IsWindowVisible
GetFocus
InvalidateRect
SendMessageA
GetClientRect
CallWindowProcA
EnableWindow
SetCursor
kernel32
GetStdHandle
GetConsoleOutputCP
ReleaseMutex
FileTimeToSystemTime
GetFileAttributesA
WaitForSingleObject
FindFirstFileW
HeapDestroy
GetFileAttributesW
GetLocalTime
FreeEnvironmentStringsA
DeleteCriticalSection
GetCurrentProcess
GetConsoleMode
LocalAlloc
ExpandEnvironmentStringsA
CreateFileA
SetErrorMode
FreeEnvironmentStringsW
GetCPInfo
LoadLibraryW
GetStringTypeA
InterlockedExchange
WriteFile
GetSystemTimeAsFileTime
HeapReAlloc
GetStringTypeW
GetFullPathNameA
GetExitCodeProcess
LocalFree
FormatMessageW
GetEnvironmentVariableA
FindClose
InterlockedDecrement
FormatMessageA
SetLastError
InitializeCriticalSection
GetModuleFileNameW
IsDebuggerPresent
ExitProcess
GetVersionExA
lstrlenA
VirtualAlloc
GetCommandLineA
GetOEMCP
FindResourceA
Sleep
VirtualFree
HeapCreate
TlsGetValue
CreateProcessA
SizeofResource
SetStdHandle
GetCurrentThreadId
GetACP
CloseHandle
ReadFile
GetModuleHandleA
TlsFree
RaiseException
GetCurrentThread
HeapSize
WideCharToMultiByte
GetCommandLineW
LockResource
GetCurrentProcessId
GetEnvironmentStrings
FileTimeToLocalFileTime
lstrlenW
GlobalAlloc
GlobalUnlock
GetEnvironmentStringsW
GetThreadLocale
FindNextFileW
LCMapStringA
FindResourceW
GetConsoleCP
GlobalFree
UnmapViewOfFile
LCMapStringW
GetLastError
InterlockedIncrement
HeapAlloc
TlsSetValue
GetFileType
CreateEventA
CreateFileW
CreateEventW
RemoveDirectoryA
GlobalLock
WaitForMultipleObjects
DuplicateHandle
FindNextFileA
CreateFileMappingA
GetDiskFreeSpaceA
FindFirstFileA
lstrcmpA
CompareStringW
GetProcessHeap
GetSystemInfo
GetProcAddress
DeleteFileW
GetWindowsDirectoryA
DeleteFileA
CreateDirectoryA
GetFileSize
GetStartupInfoA
FreeLibrary
LoadLibraryA
FlushFileBuffers
TlsAlloc
GetTickCount
QueryPerformanceCounter
SetEvent
lstrcmpiA
SetHandleCount
EnterCriticalSection
HeapFree
WriteConsoleW
LeaveCriticalSection
GetVersion
GetLocaleInfoA
SetEndOfFile
VirtualQuery
WriteConsoleA
TerminateProcess
SetEnvironmentVariableA
GetSystemDirectoryA
MulDiv
SetUnhandledExceptionFilter
SetFileAttributesA
CreateThread
SetFilePointer
CreateMutexA
MultiByteToWideChar
UnhandledExceptionFilter
GetModuleFileNameA
gdi32
SetBkMode
GetDeviceCaps
CreateCompatibleDC
SelectObject
CreateSolidBrush
advapi32
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
Sections
.text Size: 196KB - Virtual size: 195KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ