Static task
static1
Behavioral task
behavioral1
Sample
2aa35b55d08226d94825e3faa6d5e773a0ffc7437a0c0b91ac183631f16d035a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2aa35b55d08226d94825e3faa6d5e773a0ffc7437a0c0b91ac183631f16d035a.exe
Resource
win10v2004-20220901-en
General
-
Target
2aa35b55d08226d94825e3faa6d5e773a0ffc7437a0c0b91ac183631f16d035a
-
Size
243KB
-
MD5
0fcbfbfd1a63e42b99147aea56dc1479
-
SHA1
27c64716a574b92ab7f13255490fce49a51716e1
-
SHA256
2aa35b55d08226d94825e3faa6d5e773a0ffc7437a0c0b91ac183631f16d035a
-
SHA512
815df8df64617aa6fa0acc735e231a0a807a534b33d4f50316543966f7631a3e5ef3e97d83ec595217a585e480da8b861d015959ccaf6a30d7e4039ac204c03f
-
SSDEEP
6144:KRH2d/YoqbVvjiE1uC/A/CeXvqXvfhsXKrM0JZUO:KRWd/YoqBvjfO/CkihsIb
Malware Config
Signatures
Files
-
2aa35b55d08226d94825e3faa6d5e773a0ffc7437a0c0b91ac183631f16d035a.exe windows x86
ac27f70fdb8fcfa92669ef5e8df3355b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetMenuState
ShowOwnedPopups
GetDC
GetForegroundWindow
UnhookWindowsHookEx
InflateRect
UnregisterClassA
KillTimer
SetRect
GetClipboardData
CreateWindowExA
IsZoomed
DestroyWindow
PeekMessageW
CharUpperBuffA
GetKeyState
CharLowerBuffA
OpenClipboard
GetFocus
CharNextW
SetFocus
SetCursor
GetWindowLongA
CharToOemA
EnumWindows
CharLowerA
GetKeyboardLayoutList
GetParent
ClientToScreen
CheckMenuItem
GetWindowRect
EnableWindow
DestroyMenu
GetWindowPlacement
ShowScrollBar
EnumChildWindows
IsRectEmpty
SetClipboardData
ShowWindow
DefFrameProcA
SetScrollPos
DrawAnimatedRects
IsIconic
GetMenuStringA
IsWindow
DrawTextA
SetWindowsHookExA
DrawIconEx
SetActiveWindow
BeginPaint
SetScrollInfo
SetTimer
MsgWaitForMultipleObjects
GetPropA
EnumThreadWindows
SetWindowLongA
IsDialogMessageW
PostMessageA
GetKeyNameTextA
EmptyClipboard
LoadCursorA
SetClassLongA
SetWindowLongW
GetWindowLongW
SetMenu
MessageBeep
GetDCEx
CreateIcon
DefMDIChildProcA
wsprintfA
LoadIconA
DeleteMenu
EqualRect
DefWindowProcA
GetKeyboardLayoutNameA
GetClassLongA
GetCapture
GetSystemMenu
GetWindowThreadProcessId
GetScrollInfo
GetKeyboardState
GetScrollPos
CallWindowProcA
SetWindowPos
DrawFrameControl
EnableScrollBar
ReleaseCapture
EndPaint
GetWindowTextA
SetWindowTextA
CreatePopupMenu
SetForegroundWindow
GetDesktopWindow
UpdateWindow
CloseClipboard
RemoveMenu
SendMessageW
GetLastActivePopup
GetKeyboardLayout
IsDialogMessageA
DrawMenuBar
GetMessagePos
GetCursorPos
EnableMenuItem
ChildWindowFromPoint
IsChild
GetSystemMetrics
SetScrollRange
GetSubMenu
FindWindowA
GetMenu
GetIconInfo
CreateMenu
SendMessageA
RemovePropA
IsWindowUnicode
GetMenuItemCount
GetClassInfoA
ReleaseDC
TranslateMDISysAccel
CallNextHookEx
InsertMenuItemA
GetMenuItemID
RegisterClassA
SetPropA
RegisterClipboardFormatA
PeekMessageA
TrackPopupMenu
MapVirtualKeyA
DispatchMessageA
LoadStringA
RedrawWindow
GetTopWindow
IsWindowEnabled
DispatchMessageW
SetWindowPlacement
GetWindow
WaitMessage
GetActiveWindow
InvalidateRect
DestroyCursor
AdjustWindowRectEx
DrawIcon
RegisterWindowMessageA
GetSysColor
ActivateKeyboardLayout
GetSysColorBrush
FrameRect
GetScrollRange
DestroyIcon
MessageBoxA
SetCapture
OffsetRect
GetWindowDC
GetDlgItem
SystemParametersInfoA
WindowFromPoint
GetClassNameA
ScreenToClient
GetCursor
LoadBitmapA
CharNextA
MoveWindow
PostQuitMessage
InsertMenuA
SetParent
MapWindowPoints
GetClientRect
TranslateMessage
IsWindowVisible
ScrollWindow
SetMenuItemInfoA
LoadKeyboardLayoutA
msvcrt
memset
asin
memmove
strcmp
log
sin
memcpy
atol
tan
kernel32
LocalAlloc
lstrcpynA
HeapDestroy
GetModuleFileNameA
LocalFree
InitializeCriticalSection
GetCPInfo
MoveFileExA
GlobalAddAtomA
GetEnvironmentStrings
FreeLibrary
RaiseException
DeleteFileA
GetFullPathNameA
GetProcAddress
lstrcpyA
ResetEvent
GetFileSize
lstrlenA
GetProcessHeap
GetStdHandle
FormatMessageA
GetOEMCP
SetFilePointer
WriteFile
LoadLibraryA
GetFileType
SetHandleCount
FindClose
GetLastError
LoadResource
SizeofResource
VirtualAlloc
ReadFile
GlobalFindAtomA
CreateThread
GetTickCount
CreateEventA
SetEndOfFile
ExitThread
GetFileAttributesA
lstrcmpiA
ExitProcess
GetStringTypeA
VirtualAllocEx
GetACP
MulDiv
GetStringTypeW
GetUserDefaultLCID
GetDiskFreeSpaceA
GetVersionExA
GetLocaleInfoA
GetCurrentThreadId
GetThreadLocale
SetThreadLocale
Sleep
VirtualQuery
GlobalDeleteAtom
GetModuleHandleA
FreeResource
lstrcmpA
WaitForSingleObject
MoveFileA
LocalReAlloc
GlobalAlloc
SetErrorMode
VirtualFree
FindFirstFileA
HeapFree
GetCurrentProcessId
GetLocalTime
LockResource
EnterCriticalSection
SetEvent
HeapAlloc
lstrcatA
CloseHandle
GetCurrentThread
EnumCalendarInfoA
GetCommandLineA
LoadLibraryExA
DeleteCriticalSection
CreateFileA
GetStartupInfoA
GetSystemDefaultLangID
CompareStringA
SetLastError
GetVersion
GetCurrentProcess
GetDateFormatA
Sections
.text Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: 512B - Virtual size: 454B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 207KB - Virtual size: 206KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ