Static task
static1
Behavioral task
behavioral1
Sample
adbae938b45951b9ea17e1518bc485913674214dad1c08b1d5df2f650d06420d.exe
Resource
win7-20220812-en
General
-
Target
adbae938b45951b9ea17e1518bc485913674214dad1c08b1d5df2f650d06420d
-
Size
797KB
-
MD5
5e54b08fc258c143cb8a88e8deb89927
-
SHA1
91cdcb31f2bf7b29d43d9b6be32eef375f6e8d28
-
SHA256
adbae938b45951b9ea17e1518bc485913674214dad1c08b1d5df2f650d06420d
-
SHA512
140534606f4d69824d82a1c8ecb065c0be89df682736b7bb1bc00b4f1a77d64f05b592eb0314e21853ebd34247da4b8d5c359c5f987de71f6465ceeedfb6b43d
-
SSDEEP
24576:BscaIeB5iMOP3twjeSy9ll5cOiSYNlL2GoswfW2tTAkRPlt:Bs/IeB5jMdwjeSyl5tiSYf2GosuWYTA0
Malware Config
Signatures
Files
-
adbae938b45951b9ea17e1518bc485913674214dad1c08b1d5df2f650d06420d.exe windows x86
028937259ba67f253f37eb365114b165
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
shell32
SHGetMalloc
SHGetPathFromIDListW
SHBrowseForFolderW
ShellExecuteW
CommandLineToArgvW
SHFileOperationW
SHGetSpecialFolderLocation
ShellExecuteExW
comctl32
ord17
kernel32
CreateProcessW
lstrcpyW
GetWindowsDirectoryW
SetErrorMode
GetTempPathW
ExpandEnvironmentStringsW
LockResource
SizeofResource
LoadResource
FindResourceW
GetTickCount
GetExitCodeThread
CreateThread
CopyFileW
InterlockedIncrement
InterlockedDecrement
QueryPerformanceFrequency
CreateEventW
lstrcatW
GetTempFileNameW
CompareStringA
CompareStringW
GetVersionExW
LoadLibraryW
FreeLibrary
GetProcAddress
GetExitCodeProcess
ExitThread
GetCommandLineW
lstrcmpW
lstrcmpiW
GetSystemDefaultLCID
GlobalHandle
VerLanguageNameW
MoveFileW
SetCurrentDirectoryW
FindClose
FindNextFileW
CompareFileTime
FindFirstFileW
GetSystemTimeAsFileTime
SetFileAttributesW
LocalFree
FormatMessageW
GetSystemInfo
MulDiv
IsValidCodePage
GetVersion
GetModuleHandleW
GetFileAttributesW
GetCurrentDirectoryW
GetSystemDirectoryW
FileTimeToLocalFileTime
GetFileTime
IsBadReadPtr
VirtualQuery
lstrcmpiA
lstrcpyA
FlushFileBuffers
SetEndOfFile
GetDiskFreeSpaceW
GetDriveTypeW
CreateDirectoryW
GetLastError
GetLocaleInfoW
ResetEvent
VirtualProtect
GetCurrentProcessId
WaitForSingleObject
LoadLibraryExW
GetDateFormatW
WideCharToMultiByte
GetLocalTime
GetProcessTimes
OpenProcess
SearchPathW
SetEnvironmentVariableA
GetOEMCP
GetACP
GetTimeZoneInformation
SetStdHandle
SetConsoleCtrlHandler
LoadLibraryA
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidLocale
GetCPInfo
GetStringTypeW
GetStringTypeA
IsBadCodePtr
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetCommandLineA
GetEnvironmentStrings
GetEnvironmentStringsW
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetModuleFileNameA
SetLastError
FatalAppExitA
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
HeapSize
GetStartupInfoW
GetModuleHandleA
HeapReAlloc
TerminateProcess
RaiseException
RtlUnwind
LeaveCriticalSection
DeleteCriticalSection
InterlockedExchange
InitializeCriticalSection
EnterCriticalSection
lstrcmpA
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
lstrlenA
CreateFileW
GetFileSize
ExitProcess
GetCurrentProcess
DuplicateHandle
GetThreadContext
VirtualProtectEx
WriteProcessMemory
FlushInstructionCache
SetThreadContext
ResumeThread
DeleteFileW
Sleep
RemoveDirectoryW
SetFilePointer
GetProcessHeap
HeapAlloc
HeapFree
WriteFile
lstrcpynW
GetModuleFileNameW
FindResourceExW
lstrlenW
GlobalAlloc
CloseHandle
GlobalLock
ReadFile
GlobalUnlock
GlobalFree
GetTimeFormatW
MultiByteToWideChar
SetEvent
QueryPerformanceCounter
SystemTimeToFileTime
lstrcpynA
LocalAlloc
CreateFileA
GetTimeFormatA
GetCurrentThread
GetDateFormatA
user32
UpdateWindow
SetCursor
GetWindow
GetDlgItemTextW
SetFocus
GetParent
GetWindowTextLengthW
GetWindowTextW
MoveWindow
GetWindowPlacement
DrawIcon
DestroyIcon
GetDlgCtrlID
FillRect
GetSysColor
GetSysColorBrush
GetSystemMetrics
SetRect
IntersectRect
SubtractRect
CharNextW
FindWindowExW
IsDialogMessageW
EnableWindow
SetWindowTextW
SendMessageW
GetWindowRect
ScreenToClient
IsWindow
GetClassInfoW
WaitForInputIdle
GetWindowLongW
BeginPaint
EndPaint
SetWindowLongW
GetClientRect
ClientToScreen
SetWindowPos
GetWindowDC
EndDialog
GetDlgItem
ShowWindow
GetDesktopWindow
wsprintfW
MsgWaitForMultipleObjects
PeekMessageW
MessageBoxW
CreateDialogIndirectParamW
CreateDialogParamW
DialogBoxIndirectParamW
DialogBoxParamW
DefWindowProcW
PostMessageW
KillTimer
PostQuitMessage
SetTimer
LoadIconW
LoadCursorW
RegisterClassW
CreateWindowExW
GetMessageW
TranslateMessage
DispatchMessageW
GetDC
ReleaseDC
wvsprintfW
LoadStringW
CharPrevW
ExitWindowsEx
SendDlgItemMessageW
DestroyWindow
FindWindowW
SetDlgItemTextW
CharUpperW
gdi32
CreateFontW
GetTextExtentPoint32W
SetBkMode
SetTextColor
GetObjectW
CreateFontIndirectW
CreateSolidBrush
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
DeleteObject
GetStockObject
GetSystemPaletteEntries
CreatePalette
GetDeviceCaps
SelectPalette
RealizePalette
CreateDIBitmap
TranslateCharsetInfo
advapi32
RegEnumKeyW
RegCreateKeyW
RegQueryValueExA
RegOpenKeyExA
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyW
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
RegEnumValueW
RegDeleteValueW
RegSetValueExW
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenThreadToken
RegDeleteKeyW
RegEnumKeyExW
FreeSid
ole32
CLSIDFromProgID
CoCreateInstance
StringFromCLSID
CoTaskMemFree
CoInitializeSecurity
CreateItemMoniker
GetRunningObjectTable
ProgIDFromCLSID
StringFromGUID2
CoUninitialize
CoInitialize
CoCreateGuid
oleaut32
SysAllocString
VariantClear
VariantChangeType
GetErrorInfo
SysReAllocStringLen
SysAllocStringLen
SysFreeString
CreateErrorInfo
RegisterTypeLi
LoadTypeLi
SetErrorInfo
SysStringLen
rpcrt4
UuidFromStringW
RpcStringFreeW
UuidToStringW
UuidCreate
Sections
.text Size: 500KB - Virtual size: 496KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 44KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.prdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE