Static task
static1
Behavioral task
behavioral1
Sample
dacb6115c6d58d57e87ce1178b663f55d8ed30a669ce2b820abbc4def97955e1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dacb6115c6d58d57e87ce1178b663f55d8ed30a669ce2b820abbc4def97955e1.exe
Resource
win10v2004-20220901-en
General
-
Target
dacb6115c6d58d57e87ce1178b663f55d8ed30a669ce2b820abbc4def97955e1
-
Size
676KB
-
MD5
a17600908d84e596848e28940f944a70
-
SHA1
c766eac47ffd68b552e6ef72b9f57066d6465786
-
SHA256
dacb6115c6d58d57e87ce1178b663f55d8ed30a669ce2b820abbc4def97955e1
-
SHA512
50b6c4b0c5f2bb1d3fcb61afefb266d43facb6c89abb50c880943e5e901a2fb2bf4b31313bd6d402bb5b36f52c6664c376c6d8c2332d5201f34ff02a346b1130
-
SSDEEP
12288:Yx4JFHLDoEhSaS6/1wLX4IV6pGf878Zcum691oWgG1eJO/hvyQP:Yx4LEEhSF6aLIRoE78Pm6ba4eJ8hvy
Malware Config
Signatures
Files
-
dacb6115c6d58d57e87ce1178b663f55d8ed30a669ce2b820abbc4def97955e1.exe windows x86
8feb9e77cae2fa63d9606743c58e26bc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ClientToScreen
GetWindowThreadProcessId
MoveWindow
GetAncestor
GetLastActivePopup
GetWindowTextW
WindowFromPoint
SendDlgItemMessageA
DrawEdge
GetSystemMenu
CallWindowProcW
SetClipboardData
RemovePropW
GetDlgItem
MessageBeep
GetIconInfo
EndPaint
GetCursorPos
GetUpdateRect
LoadIconW
EnumWindows
DrawStateW
GetWindowRgn
GetTopWindow
GetWindow
GetPropW
GetWindowPlacement
GetClassInfoW
GetWindowTextLengthW
IsMenu
SetMenu
GetWindowRect
DefFrameProcW
OpenClipboard
SetCursor
GetMenuItemCount
FillRect
LoadMenuW
SetFocus
SetPropW
GetDesktopWindow
UnpackDDElParam
BeginPaint
IsClipboardFormatAvailable
ShowOwnedPopups
GetSysColor
ReleaseDC
MessageBoxW
TrackPopupMenu
TranslateAcceleratorW
PostThreadMessageW
IsWindow
DrawTextW
wsprintfW
WinHelpW
UnhookWindowsHookEx
DrawFocusRect
InvalidateRgn
EndDeferWindowPos
GetClassInfoExW
IntersectRect
LockWindowUpdate
IsRectEmpty
DestroyIcon
LoadImageW
CreateWindowExW
BeginDeferWindowPos
SetActiveWindow
PeekMessageW
RegisterClassExW
LoadBitmapW
EnableMenuItem
RegisterClassW
RedrawWindow
InvalidateRect
GetDlgCtrlID
SetWindowsHookExW
GetMenu
GetParent
IsChild
gdi32
RestoreDC
ScaleWindowExtEx
TextOutW
OffsetWindowOrgEx
OffsetViewportOrgEx
CreateEllipticRgn
GetTextCharsetInfo
SetPolyFillMode
PatBlt
SetBkMode
SetPixel
SetPixelV
CreatePatternBrush
GetStockObject
ScaleViewportExtEx
CreateRectRgnIndirect
SetTextAlign
CreateDIBitmap
SaveDC
GetTextMetricsA
Polyline
DeleteObject
CreatePen
Arc
GetDeviceCaps
Escape
CreateBitmap
LineTo
GetMapMode
comctl32
ord17
_TrackMouseEvent
ImageList_Remove
InitCommonControlsEx
ImageList_GetImageInfo
ImageList_GetImageCount
ImageList_ReplaceIcon
DestroyPropertySheetPage
ImageList_Create
ImageList_Destroy
PropertySheetW
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
ShellExecuteExA
DragAcceptFiles
kernel32
MultiByteToWideChar
FlushFileBuffers
WideCharToMultiByte
CompareStringA
GetStartupInfoA
FreeEnvironmentStringsW
CloseHandle
GetStringTypeA
LCMapStringA
LCMapStringW
GetModuleHandleA
GetCPInfo
HeapFree
InterlockedExchange
GetStdHandle
GetEnvironmentStringsW
GetModuleFileNameA
FreeEnvironmentStringsA
VirtualAlloc
RtlUnwind
GetVersion
ReadFile
SetStdHandle
GetModuleHandleW
QueryPerformanceCounter
GetModuleFileNameW
GetTimeZoneInformation
GetCurrentProcess
TlsFree
SetHandleCount
LeaveCriticalSection
GetStringTypeW
TlsSetValue
GetTickCount
GetSystemTime
DeleteCriticalSection
VirtualQuery
HeapReAlloc
GetCurrentThreadId
InitializeCriticalSection
FatalAppExitA
InterlockedIncrement
GetCurrentThread
GetStartupInfoW
GetLocalTime
GetCommandLineW
TerminateProcess
HeapCreate
LoadLibraryA
IsBadWritePtr
InterlockedDecrement
ExitProcess
UnhandledExceptionFilter
SetFilePointer
GetEnvironmentStrings
GetSystemTimeAsFileTime
EnterCriticalSection
TlsAlloc
WriteFile
CompareStringW
GetProcAddress
SetEnvironmentVariableA
GetLastError
CreateMutexW
GetCurrentProcessId
TlsGetValue
VirtualFree
HeapDestroy
HeapAlloc
SetLastError
GetFileType
GetCommandLineA
advapi32
RegCreateKeyExW
RegQueryValueW
RegEnumKeyW
Sections
.text Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 440KB - Virtual size: 439KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ