Static task
static1
Behavioral task
behavioral1
Sample
7b98837bd09e76519f011df1ff17e008c9c4a4634fc444e42e4c6d5bed3639df.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7b98837bd09e76519f011df1ff17e008c9c4a4634fc444e42e4c6d5bed3639df.exe
Resource
win10v2004-20220812-en
General
-
Target
7b98837bd09e76519f011df1ff17e008c9c4a4634fc444e42e4c6d5bed3639df
-
Size
172KB
-
MD5
e7154649a7a1c7811b500b6e442d050c
-
SHA1
aeee8f3a1d7ae9d5565b4278371f907fc831c69e
-
SHA256
7b98837bd09e76519f011df1ff17e008c9c4a4634fc444e42e4c6d5bed3639df
-
SHA512
c1ac751dd78563d2e5c568da206d9b80feaa10c1c2eefcebec38f302f4b8941e5576b2766bc5813b4a7d07bc5c1ecef547c7c69675c798a21831d229b6dc0446
-
SSDEEP
3072:4Ffu30TmUEGTSkJTF3qx2Q1zsDhyCrS/wYJXon5VvB:4FfukqUEGTH6m9bcXon/v
Malware Config
Signatures
Files
-
7b98837bd09e76519f011df1ff17e008c9c4a4634fc444e42e4c6d5bed3639df.exe windows x86
c3f4c14f6802835ce1cc2d3028ae696a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
VariantCopyInd
SysFreeString
SysAllocStringLen
VariantClear
SysReAllocStringLen
SysStringLen
VariantChangeTypeEx
ole32
IsEqualGUID
kernel32
GetStartupInfoA
VirtualQuery
SetFilePointer
HeapFree
GetLocaleInfoA
GetFileSize
GetVersion
GetStringTypeW
GlobalDeleteAtom
GetLastError
GlobalReAlloc
lstrlenA
HeapAlloc
RaiseException
LoadResource
LocalFree
GlobalAddAtomA
FreeLibrary
LoadLibraryA
GetSystemInfo
GlobalUnlock
LoadLibraryExA
GetCPInfo
EnterCriticalSection
CloseHandle
GetVersionExA
SetLastError
TlsSetValue
GetThreadLocale
CreateFileA
GetFileType
lstrcmpA
GlobalHandle
SetThreadLocale
GetACP
GetSystemDirectoryA
VirtualAlloc
lstrcpyA
SetConsoleCtrlHandler
GetProcAddress
GetCurrentThreadId
WideCharToMultiByte
ReadFile
WriteFile
GetProcessHeap
GetModuleHandleA
EnumCalendarInfoA
GetStdHandle
TlsAlloc
DeleteCriticalSection
MulDiv
WaitForSingleObject
TlsGetValue
SetEvent
GetOEMCP
LocalAlloc
GlobalLock
FormatMessageA
lstrcpynA
SetHandleCount
GetDiskFreeSpaceA
InitializeCriticalSection
SetEndOfFile
MultiByteToWideChar
ExitProcess
CompareStringA
WinExec
RtlUnwind
GetLocalTime
TlsFree
InterlockedIncrement
DeleteFileA
GetEnvironmentStringsA
LockResource
LeaveCriticalSection
SetErrorMode
GetCurrentProcess
GetPrivateProfileStringA
CreateEventA
SizeofResource
CreateThread
GetCommandLineA
GetTickCount
GlobalFree
FindClose
FindFirstFileA
InterlockedDecrement
VirtualFree
GlobalAlloc
FindResourceA
UnhandledExceptionFilter
GetModuleFileNameA
GetWindowsDirectoryA
advapi32
RegDeleteKeyA
RegDeleteValueA
OpenProcessToken
RegOpenKeyA
RegCloseKey
LookupPrivilegeValueA
RegOpenKeyExA
AdjustTokenPrivileges
RegQueryValueExA
Sections
.text Size: 148KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ