Static task
static1
Behavioral task
behavioral1
Sample
google chrome.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
google chrome.exe
Resource
win10v2004-20220812-en
General
-
Target
aabaa02691b8b3213083f878a1cb4891b58007bfc4c3eb2d3c152c60fb9821ed
-
Size
1.2MB
-
MD5
cab50ddd02b20c4cf1db103fe91475d4
-
SHA1
2987885a3fe8e4df1158bf70275405463be6da8c
-
SHA256
aabaa02691b8b3213083f878a1cb4891b58007bfc4c3eb2d3c152c60fb9821ed
-
SHA512
0fa1209889481eaf14547b717053a3b885aa86b00abdd7ba5a794ba3d806a6d9539b8ee4b08dc72a3249be1a5a6ef798ab9cb23ffbf0f980e1ab30389b5069de
-
SSDEEP
24576:T669Pv7DEGF5AubkhVXZ8WYM7Orh0zr4OhujxrINJH4QT8/:T669n/f5/bkhVXZ8W3KwphuVkNJYGI
Malware Config
Signatures
Files
-
aabaa02691b8b3213083f878a1cb4891b58007bfc4c3eb2d3c152c60fb9821ed.rar
-
google chrome.exe.exe windows x86
93639de3e2bb8e8c2715707d49832c3e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
GetUserNameA
user32
GetKeyState
GetActiveWindow
GetSystemMetrics
GetDoubleClickTime
GetSysColor
SystemParametersInfoA
IsClipboardFormatAvailable
SendMessageA
InvalidateRect
CreateIconIndirect
LoadImageA
LoadIconA
GetIconInfo
GetClipboardData
EmptyClipboard
OpenClipboard
CloseClipboard
SetClipboardData
RegisterClipboardFormatA
GetClipboardFormatNameA
SetWindowTextW
SetWindowTextA
DestroyIcon
MessageBeep
GetWindowPlacement
BeginPaint
EndPaint
DefWindowProcW
GetKeyboardLayout
PostMessageA
LoadCursorA
RegisterClassW
CreateWindowExW
GetDC
GetUpdateRgn
HideCaret
ValidateRect
ScrollWindow
AdjustWindowRectEx
SetWindowPos
GetWindowRect
GetClientRect
ClientToScreen
CreateCaret
SetCaretPos
ShowCaret
UnregisterHotKey
ReleaseCapture
MsgWaitForMultipleObjects
SetCursor
DestroyCursor
RegisterClassA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageW
DispatchMessageA
GetCursorPos
ReleaseDC
GetCapture
SetCapture
GetFocus
SetFocus
GetForegroundWindow
GetParent
SetForegroundWindow
GetWindowLongA
SetWindowLongA
UpdateWindow
DestroyCaret
GetWindow
SetTimer
MessageBoxA
PostThreadMessageA
DestroyWindow
PostQuitMessage
DefWindowProcA
PeekMessageA
IsWindowUnicode
PeekMessageW
AdjustWindowRect
IsIconic
IsZoomed
ShowWindow
gdi32
ExtSelectClipRgn
CreateDCA
GetROP2
GetCurrentObject
GetBkColor
GetTextColor
SetROP2
Polyline
PolyPolyline
MoveToEx
LineTo
RectVisible
Ellipse
Arc
Polygon
PolyPolygon
CreatePatternBrush
SetTextColor
SetBkColor
PatBlt
CreateRectRgnIndirect
CreatePen
GetStockObject
GetNearestColor
GetTextMetricsA
CreateICA
GetClipRgn
SetTextAlign
GetViewportOrgEx
GetDeviceCaps
LPtoDP
CreatePalette
SetMapMode
SetViewportExtEx
SetViewportOrgEx
SetWindowExtEx
SetWindowOrgEx
CreateSolidBrush
CreateDIBitmap
GetObjectA
GetDIBits
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBSection
SetDIBitsToDevice
CreateBitmap
BitBlt
SelectObject
DeleteDC
StretchDIBits
SelectPalette
RealizePalette
CreateRectRgn
SelectClipRgn
DeleteObject
GdiFlush
GetCharWidthW
GetCharABCWidthsW
EnumFontFamiliesA
ExtTextOutW
CreateFontA
SetBkMode
GetCharABCWidthsA
kernel32
GetLastError
HeapCreate
HeapSize
GetProcessHeap
CreateFileW
SetEnvironmentVariableW
SetEnvironmentVariableA
CompareStringW
SetStdHandle
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetCPInfo
LCMapStringW
LCMapStringA
ExitThread
ExitProcess
GetModuleHandleW
GetStartupInfoA
GetCommandLineA
HeapAlloc
GetModuleFileNameW
GetFileType
WriteConsoleW
HeapFree
RaiseException
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
RtlUnwind
InterlockedExchange
GetLocaleInfoW
GetCurrentProcess
GlobalMemoryStatus
FreeLibrary
VirtualAlloc
VirtualFree
OutputDebugStringA
ReadFile
SetFilePointer
SetEndOfFile
GetFileSize
GetStdHandle
SetUnhandledExceptionFilter
GetLocalTime
WriteFile
IsBadReadPtr
GetModuleFileNameA
GetVersionExA
GetEnvironmentStringsW
FreeEnvironmentStringsW
CreateEventA
SetEvent
CreateSemaphoreA
ReleaseSemaphore
FormatMessageA
MultiByteToWideChar
WideCharToMultiByte
GetUserDefaultLCID
GetDriveTypeA
FindFirstFileA
CreateDirectoryA
CreateFileA
CloseHandle
DeleteFileA
MoveFileA
FindNextFileA
GetConsoleOutputCP
WriteConsoleA
IsValidLocale
EnumSystemLocalesA
GetStringTypeW
GetStringTypeA
VirtualQuery
IsValidCodePage
GetOEMCP
GetACP
FlushFileBuffers
GetConsoleMode
GetConsoleCP
InitializeCriticalSectionAndSpinCount
GetCurrentProcessId
SetHandleCount
GetEnvironmentStrings
FreeEnvironmentStringsA
LoadLibraryW
HeapReAlloc
FindClose
LeaveCriticalSection
EnterCriticalSection
InterlockedDecrement
InterlockedIncrement
GetCurrentDirectoryA
Sleep
DeleteCriticalSection
InitializeCriticalSection
GetModuleHandleA
GlobalSize
GlobalAlloc
GetLocaleInfoA
WaitForSingleObject
LoadLibraryA
GetProcAddress
GetVersion
InterlockedExchangeAdd
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GlobalLock
GlobalUnlock
GlobalFree
CreateThread
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetMalloc
ShellExecuteA
winmm
PlaySoundA
ole32
CoCreateGuid
DoDragDrop
CoTaskMemFree
ReleaseStgMedium
OleUninitialize
OleInitialize
RevokeDragDrop
RegisterDragDrop
ws2_32
accept
send
recv
closesocket
gethostbyname
connect
htons
htonl
bind
WSAGetLastError
select
WSAStartup
ntohl
setsockopt
ioctlsocket
socket
Sections
.text Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 816KB - Virtual size: 816KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 130KB - Virtual size: 307KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 98KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ