Static task
static1
Behavioral task
behavioral1
Sample
60770a4b72907f12f7ce5cc7955cf9db91e6b01e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
60770a4b72907f12f7ce5cc7955cf9db91e6b01e.exe
Resource
win10v2004-20221111-en
General
-
Target
60770a4b72907f12f7ce5cc7955cf9db91e6b01e
-
Size
440KB
-
MD5
e7fda98f0eb867c89038f1bf351b2f2a
-
SHA1
60770a4b72907f12f7ce5cc7955cf9db91e6b01e
-
SHA256
c48eeb178921c22d32d4e2b64f9c67e11d54c6eab2a100bc6b07c8d2645a80b1
-
SHA512
ea016467ae560060756295334f7637b54413c058726ff82264a93af1c9a2156c5f52b5ee4c07e78de6def424d9c4f4e5ed210cde1c93f70daa58f58d679ba884
-
SSDEEP
6144:rH5GTHUDqE1LrksedwkT0UJiCQ3rx18BPZZ4Q41bP0lGc42MigsUqd:rUUlWdwkT0739YKb8l142Ma
Malware Config
Signatures
Files
-
60770a4b72907f12f7ce5cc7955cf9db91e6b01e.exe windows x86
26454ff0e17aa7d64c211a42acf6b6bf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LocalLock
HeapDestroy
GetModuleHandleA
HeapUnlock
GetLastError
DeleteAtom
FindAtomA
AddAtomA
GetTickCount
SetLastError
VirtualAlloc
Sleep
GetSystemDirectoryA
SuspendThread
ExitProcess
GetCurrentProcessId
VirtualQuery
GetSystemInfo
VirtualProtect
RtlUnwind
GetLocaleInfoA
ReleaseSemaphore
SetEvent
GetStringTypeW
GetStringTypeA
HeapSize
GetSystemTimeAsFileTime
QueryPerformanceCounter
LCMapStringW
MultiByteToWideChar
LCMapStringA
InitializeCriticalSection
GetCPInfo
GetOEMCP
GetACP
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapAlloc
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
HeapCreate
VirtualFree
HeapFree
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
LoadLibraryA
user32
LoadBitmapA
GetDC
PostMessageA
IsWindowUnicode
psapi
GetWsChanges
EnumProcessModules
EmptyWorkingSet
GetModuleBaseNameA
GetProcessMemoryInfo
avifil32
AVIGetFromClipboard
shlwapi
SHOpenRegStream2A
SHDeleteValueA
gdiplus
GdipCreateFromHDC
GdipDeleteGraphics
GdipDrawString
GdipFree
GdipDeleteFontFamily
GdipCreateFont
GdipDeleteFont
GdipAlloc
GdipCreateSolidFill
GdipDeleteBrush
GdipCreateFontFamilyFromName
GdipCloneBrush
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 312KB - Virtual size: 308KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 456KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ