Static task
static1
Behavioral task
behavioral1
Sample
adced5f878d826cec9ce6dc4a361d04ddd9dd0b4c5c9fc624f2b6f1f1bd5157c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
adced5f878d826cec9ce6dc4a361d04ddd9dd0b4c5c9fc624f2b6f1f1bd5157c.exe
Resource
win10v2004-20220812-en
General
-
Target
adced5f878d826cec9ce6dc4a361d04ddd9dd0b4c5c9fc624f2b6f1f1bd5157c
-
Size
240KB
-
MD5
695261105ca088cbc778228f2bbef860
-
SHA1
1458b070bf390ec3605aa0c2e843d4b60bdc0d2f
-
SHA256
adced5f878d826cec9ce6dc4a361d04ddd9dd0b4c5c9fc624f2b6f1f1bd5157c
-
SHA512
c774853cf0bb8f66adc85602714c3c067d34ddd1442ff116292c67cfaa814bbb3b93ad551d456d6faddc2438c8a9bbd5e0c70f63ebc6663cb85dec16adf13169
-
SSDEEP
3072:8jnr+sCdVBYkdj9HPzMSBTCizp7QBvKXcEYb3WTZuzMO7miAtyQ+2GX/SjtAgsxJ:l4QdMSlb7QBkRYbTtQXoStsX
Malware Config
Signatures
Files
-
adced5f878d826cec9ce6dc4a361d04ddd9dd0b4c5c9fc624f2b6f1f1bd5157c.exe windows x86
3c12e3998df7d217561d2c7feb4fb162
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessVersion
GetCPInfo
GetOEMCP
GetFileSize
SetErrorMode
GetTickCount
RtlUnwind
GetTimeZoneInformation
GetSystemTime
ExitProcess
GetDriveTypeA
HeapFree
HeapAlloc
RaiseException
GetStartupInfoA
GetCommandLineA
GetACP
HeapReAlloc
HeapSize
SetStdHandle
GetFileType
GetEnvironmentVariableA
GlobalFlags
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
FileTimeToLocalFileTime
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
EnterCriticalSection
GetFullPathNameA
GetVolumeInformationA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
DuplicateHandle
lstrcpynA
MulDiv
SetLastError
GetThreadLocale
InterlockedDecrement
InterlockedIncrement
GetVersion
lstrcatA
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcpyA
GetModuleHandleA
GlobalUnlock
GlobalFree
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
LoadLibraryA
GetProcAddress
FreeLibrary
FormatMessageA
LocalFree
GetCurrentProcess
GetLastError
TerminateProcess
CreateToolhelp32Snapshot
GetCurrentProcessId
Process32First
OpenProcess
GetExitCodeProcess
Process32Next
GetLocalTime
SystemTimeToFileTime
ExpandEnvironmentStringsA
WriteFile
WritePrivateProfileStringA
CreateFileA
GetFileTime
FileTimeToSystemTime
CloseHandle
GetSystemDirectoryA
GetTempPathA
GetWindowsDirectoryA
GetCurrentDirectoryA
WaitForSingleObject
FindFirstFileA
FindClose
Sleep
GetFileAttributesA
GetTempFileNameA
DeleteFileA
SetFileAttributesA
lstrlenW
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
lstrlenA
GetVersionExA
MultiByteToWideChar
user32
PostThreadMessageA
LoadStringA
GetSysColorBrush
LoadCursorA
PtInRect
GetDesktopWindow
GrayStringA
DrawTextA
TabbedTextOutA
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
CharNextA
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
ScreenToClient
CopyRect
GetTopWindow
IsChild
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgCtrlID
CreateWindowExA
GetClassLongA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
RegisterWindowMessageA
OffsetRect
SystemParametersInfoA
RegisterClipboardFormatA
GetWindowPlacement
MapDialogRect
SetWindowPos
SetWindowContextHelpId
EndDialog
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
PeekMessageA
DestroyMenu
MessageBeep
GetNextDlgGroupItem
SetRect
CopyAcceleratorTableA
GetCursorPos
SetWindowsHookExA
GetLastActivePopup
IsWindowEnabled
MessageBoxA
SetCursor
PostQuitMessage
IsWindowVisible
SetForegroundWindow
SetActiveWindow
FindWindowExA
GetClassNameA
GetWindow
CharUpperA
EnableWindow
GetWindowRect
GetParent
GetWindowTextA
PostMessageA
IsWindow
SetTimer
KillTimer
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
SendMessageA
GetWindowLongA
SetWindowLongA
LoadIconA
SetPropA
UnregisterClassA
gdi32
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
DPtoLP
LPtoDP
GetWindowExtEx
GetViewportExtEx
DeleteObject
GetMapMode
CreateBitmap
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SelectObject
RestoreDC
SaveDC
DeleteDC
GetStockObject
GetDeviceCaps
GetBkColor
GetTextColor
GetObjectA
SetBkColor
SetTextColor
GetClipBox
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
comctl32
ord17
oledlg
ord8
ole32
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
OleInitialize
OleUninitialize
CLSIDFromString
CLSIDFromProgID
StgOpenStorageOnILockBytes
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
CoGetClassObject
CoFreeUnusedLibraries
olepro32
ord253
oleaut32
SysAllocStringByteLen
VariantCopy
VariantTimeToSystemTime
SysStringLen
VariantInit
SysAllocStringLen
SysFreeString
VariantChangeType
SysAllocString
VariantClear
urlmon
UrlMkGetSessionOption
UrlMkSetSessionOption
wininet
InternetOpenA
InternetSetOptionA
InternetOpenUrlA
InternetCloseHandle
InternetQueryDataAvailable
InternetReadFile
DeleteUrlCacheEntry
iphlpapi
GetAdaptersInfo
psapi
GetModuleFileNameExA
Sections
.text Size: 164KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ