Static task
static1
Behavioral task
behavioral1
Sample
caaffabe0369b40cb5827d5fb0778b8b9155b26e71a8387e2f272190ac4fd415.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
caaffabe0369b40cb5827d5fb0778b8b9155b26e71a8387e2f272190ac4fd415.exe
Resource
win10v2004-20220812-en
General
-
Target
caaffabe0369b40cb5827d5fb0778b8b9155b26e71a8387e2f272190ac4fd415
-
Size
325KB
-
MD5
e3c9bd84ffe58fb4f533f3b58018c94b
-
SHA1
f906e62b4b89c81956b9adc0964f84b0a5fe08fc
-
SHA256
caaffabe0369b40cb5827d5fb0778b8b9155b26e71a8387e2f272190ac4fd415
-
SHA512
df180e27d985ded7d12174e258b63b172eca7eead0011e20990caa4e8ee02a85020002e3b97745ed89ef8e57202616c37a31bd95aeb08bcb24b537f589f5146f
-
SSDEEP
6144:p2BdakzFvw9SHlF8bYrqrWZdK9Xtn+gZCCudSTNix933Kni0zL8Q42ZycvNs:pCak5HlF8bYr6WzK99xVEfvci0L8CBNs
Malware Config
Signatures
Files
-
caaffabe0369b40cb5827d5fb0778b8b9155b26e71a8387e2f272190ac4fd415.exe windows x86
8eb9bb91b898991e7e7f9eff10594d55
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GlobalAlloc
WriteFile
SizeofResource
MoveFileExW
SetLastError
GetCurrentDirectoryA
LoadLibraryA
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsGetValue
GetEnvironmentStrings
GetCurrentProcess
VirtualQuery
WideCharToMultiByte
ReleaseMutex
InterlockedCompareExchange
GetConsoleOutputCP
GetModuleFileNameA
LockResource
GetExitCodeProcess
InterlockedExchange
GetSystemTimeAsFileTime
UnlockFile
IsBadWritePtr
GetFileType
LoadLibraryW
CreateFileA
SetHandleCount
lstrlenA
HeapAlloc
Sleep
GetCurrentThread
lstrcmpiA
QueryPerformanceCounter
GetTickCount
GetThreadLocale
GetTempFileNameW
TlsAlloc
IsBadCodePtr
GetStartupInfoA
LCMapStringW
TerminateProcess
GetVersion
GetCPInfo
SetEvent
GetACP
CloseHandle
GetLocalTime
GetProcAddress
GetFileSize
LeaveCriticalSection
EnterCriticalSection
GetCommandLineA
GetFileAttributesA
GetCurrentThreadId
VirtualProtect
MapViewOfFile
UnhandledExceptionFilter
GetStringTypeA
GetModuleHandleA
InitializeCriticalSection
GetCurrentProcessId
ExpandEnvironmentStringsA
SetUnhandledExceptionFilter
CreateEventW
GetLastError
GetOEMCP
InterlockedIncrement
GetProcessHeap
user32
GetSysColorBrush
DeleteMenu
SendMessageW
CharNextW
IsWindow
DrawTextA
IsDlgButtonChecked
GetWindowLongW
BringWindowToTop
CallWindowProcW
GetDC
CreateWindowExW
MoveWindow
IsWindowVisible
ShowWindow
UnhookWindowsHookEx
LoadMenuW
GetWindow
SetRect
GetMessageW
DrawEdge
WindowFromPoint
GetTopWindow
DispatchMessageA
LoadIconW
GetWindowDC
GetWindowRect
ClientToScreen
IsWindowEnabled
GetCursorPos
RedrawWindow
DestroyIcon
msvcrt
_wcsicmp
__set_app_type
_wcsnicmp
wcsncmp
__dllonexit
_CxxThrowException
wcschr
_vsnwprintf
memmove
_initterm
strchr
_adjust_fdiv
_lock
atoi
__wgetmainargs
_XcptFilter
gdi32
PatBlt
GetBkColor
SelectObject
GetTextExtentPoint32W
DeleteDC
SetTextColor
CreateCompatibleDC
CreateBitmap
CreateSolidBrush
ExcludeClipRect
DeleteObject
Sections
.text Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 193KB - Virtual size: 682KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 72B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ