Static task
static1
Behavioral task
behavioral1
Sample
aabadb0c413ef950a0e75f2f06e0c1325a5720c833d728392fb6c49845b79f7f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
aabadb0c413ef950a0e75f2f06e0c1325a5720c833d728392fb6c49845b79f7f.exe
Resource
win10v2004-20220812-en
General
-
Target
aabadb0c413ef950a0e75f2f06e0c1325a5720c833d728392fb6c49845b79f7f
-
Size
955KB
-
MD5
022331bc5196649a996cb3c5cf16d7e0
-
SHA1
ab3b07065fa0ad4f05ac346c3353912afed9ed57
-
SHA256
aabadb0c413ef950a0e75f2f06e0c1325a5720c833d728392fb6c49845b79f7f
-
SHA512
0fb6c64f559d6b5f60d54267a7e5417818fba43d41bdabdae4df042abe55f9f96efb780bef8c030ea2559ff5a8e116a4a6b8349083c5a37ff7e5f5b6167c302d
-
SSDEEP
12288:MBPBeEY20CNQW+MIHPNuZtTWii9rz3oqa0kwcgF8l2AZdEudfLN9JuTZONUo0w28:MB/YlNStTpkA0kwc+IdEiB9JuTZSOTT8
Malware Config
Signatures
Files
-
aabadb0c413ef950a0e75f2f06e0c1325a5720c833d728392fb6c49845b79f7f.exe windows x86
ae0ea60c6e9518f1de3dd9b01b387452
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
SetErrorMode
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteFileA
HeapFree
HeapAlloc
RtlUnwind
ExitProcess
RaiseException
HeapReAlloc
HeapSize
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
HeapCreate
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
GetConsoleCP
GetConsoleMode
LCMapStringA
InitializeCriticalSectionAndSpinCount
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
CreateFileA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetProcessHeap
FlushFileBuffers
SetFilePointer
InterlockedIncrement
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
GlobalFlags
InterlockedDecrement
FormatMessageW
GetModuleHandleA
GetCurrentProcessId
GlobalAddAtomW
GlobalFindAtomW
LoadLibraryA
GetLastError
SetLastError
WritePrivateProfileStringW
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesW
GetLocaleInfoW
InterlockedExchange
lstrcmpW
FreeLibrary
GetVersionExW
GetVersionExA
GetModuleHandleW
lstrcpyW
LocalFree
LocalAlloc
lstrcmpA
VirtualAlloc
TerminateThread
ExitThread
SetEvent
ResetEvent
CreateEventW
GetLocalTime
GetModuleFileNameA
GetPrivateProfileStringA
lstrlenA
MultiByteToWideChar
lstrlenW
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
ReadFile
PeekNamedPipe
GetStartupInfoW
CreatePipe
GetCurrentProcess
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
WideCharToMultiByte
Process32NextW
OpenProcess
Process32FirstW
CreateToolhelp32Snapshot
OpenFileMappingW
WriteFile
CreateFileW
WaitForSingleObject
CreateProcessW
DeleteFileW
FlushViewOfFile
MapViewOfFile
CreateFileMappingW
GetModuleFileNameW
Sleep
CreateThread
GetProcAddress
LoadLibraryW
GetSystemTime
SetDllDirectoryW
FindResourceW
LoadResource
LockResource
SizeofResource
GetTempPathW
CloseHandle
OpenMutexW
InterlockedCompareExchange
GetFileType
VirtualFree
user32
EnableMenuItem
CheckMenuItem
ShowWindow
SetWindowTextW
GetWindowThreadProcessId
IsWindowEnabled
RegisterWindowMessageW
LoadIconW
WinHelpW
GetCapture
SetWindowsHookExW
CallNextHookEx
GetClassLongW
GetClassNameW
RemovePropW
GetFocus
IsWindow
GetWindowTextW
GetForegroundWindow
GetLastActivePopup
GetDlgItem
GetTopWindow
DestroyWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
GetKeyState
SetMenu
SetForegroundWindow
GetSubMenu
GetMenuItemCount
CreateWindowExW
GetClassInfoW
RegisterClassW
GetSysColor
AdjustWindowRectEx
GetDlgCtrlID
DefWindowProcW
CallWindowProcW
GetMenu
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
PostQuitMessage
GetWindow
SetPropW
CopyRect
GetParent
GetPropW
PostThreadMessageW
PeekMessageW
GrayStringW
DrawTextExW
DrawTextW
LoadCursorW
UpdateWindow
PtInRect
TabbedTextOutW
EnableWindow
IsWindowVisible
ExitWindowsEx
KillTimer
SetCursor
GetClientRect
GetSystemMetrics
MessageBoxW
SendMessageW
SetTimer
DispatchMessageW
TranslateMessage
GetMessageW
ReleaseDC
UpdateLayeredWindow
GetDC
GetWindowRect
GetMenuItemID
InvalidateRect
PostMessageW
EqualRect
FindWindowW
GetWindowLongW
SetWindowLongW
UnregisterClassW
GetSysColorBrush
DestroyMenu
EndPaint
BeginPaint
ClientToScreen
GetActiveWindow
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
GetClassInfoExW
GetMenuState
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
SetMapMode
GetStockObject
GetDeviceCaps
RestoreDC
SaveDC
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
DeleteDC
DeleteObject
SelectObject
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
advapi32
RegDeleteKeyW
RegCloseKey
RegOpenKeyExW
RegQueryInfoKeyW
RegEnumValueW
RegQueryValueExW
OpenProcessToken
LookupPrivilegeValueW
RegQueryValueW
RegOpenKeyW
RegEnumKeyW
RegCreateKeyExW
RegSetValueExW
AdjustTokenPrivileges
shell32
ShellExecuteW
SHGetSpecialFolderPathW
shlwapi
PathFindExtensionW
PathFindFileNameW
PathFileExistsW
gdiplus
GdiplusStartup
GdiplusShutdown
GdipLoadImageFromStream
GdipCloneImage
GdipDisposeImage
GdipDrawImageRectRect
GdipReleaseDC
GdipDrawString
GdipAlloc
GdipFree
GdipDeleteBrush
GdipCreateSolidFill
GdipSetStringFormatLineAlign
GdipSetStringFormatAlign
GdipSetStringFormatFlags
GdipDeleteStringFormat
GdipCreateStringFormat
GdipDeleteFont
GdipCreateFontFromLogfontW
GdipDrawImageRectI
GdipGetImageWidth
GdipGetImageHeight
GdipDeleteGraphics
GdipCreateFromHDC
ole32
CreateStreamOnHGlobal
oleaut32
VariantChangeType
VariantInit
VariantClear
urlmon
URLDownloadToFileW
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
Sections
.text Size: 209KB - Virtual size: 208KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15.6MB - Virtual size: 15.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ