Static task
static1
Behavioral task
behavioral1
Sample
aa7bb2782deb61304fa7a1bdf8bf5a11ca80087f371ae67158582c16d4790a88.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
aa7bb2782deb61304fa7a1bdf8bf5a11ca80087f371ae67158582c16d4790a88.exe
Resource
win10v2004-20220812-en
General
-
Target
aa7bb2782deb61304fa7a1bdf8bf5a11ca80087f371ae67158582c16d4790a88
-
Size
472KB
-
MD5
0bc47c2764601680c12052f096d6e510
-
SHA1
ef517e964209b6fb12d52c934df4044c4bf8f24e
-
SHA256
aa7bb2782deb61304fa7a1bdf8bf5a11ca80087f371ae67158582c16d4790a88
-
SHA512
bf9e38882c479be9b50b31026b207b18421845b1ce14cbb186c4c1e4fed52f565e60edfe493e70ef35e5f7f9b6631fab1039ae970d66848e5521cf915891e98b
-
SSDEEP
12288:GRXuxphX5xmq6n7RuOvrTXFqMcd58dfiK:IsXR67RugT1qMcLyi
Malware Config
Signatures
Files
-
aa7bb2782deb61304fa7a1bdf8bf5a11ca80087f371ae67158582c16d4790a88.exe windows x86
9b6cf92c749234372621e460407127c7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
dbghelp
SymGetModuleInfoW
SymInitialize
SymFunctionTableAccess
SymSetOptions
SymCleanup
SymGetModuleInfo
SymLoadModule
StackWalk
wininet
InternetCloseHandle
HttpSendRequestA
InternetReadFile
InternetOpenA
InternetConnectA
HttpOpenRequestA
psapi
GetModuleFileNameExA
comctl32
ImageList_ReplaceIcon
InitCommonControlsEx
ImageList_Create
shlwapi
StrStrIW
kernel32
GetThreadLocale
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetVersion
lstrcmpW
GlobalFlags
CompareStringW
GetModuleHandleA
GetVersionExA
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomW
GlobalAddAtomW
InterlockedExchange
CompareStringA
GetLocaleInfoW
FlushFileBuffers
SetEndOfFile
GetFullPathNameW
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
GetDriveTypeW
HeapReAlloc
RtlUnwind
HeapSize
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
VirtualAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
GetCurrentDirectoryA
SetStdHandle
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetDriveTypeA
SetEnvironmentVariableA
LocalFree
FindNextFileW
lstrlenW
FindClose
FindFirstFileW
CopyFileW
GetSystemDirectoryW
DeviceIoControl
GetCurrentProcessId
GetFileAttributesW
GetCurrentThreadId
GetThreadSelectorEntry
GetLocalTime
GetFileSize
Sleep
FreeLibrary
CreateThread
InterlockedDecrement
WaitForSingleObject
InterlockedIncrement
OpenProcess
HeapFree
SetDllDirectoryW
SetCurrentDirectoryW
Process32FirstW
SetUnhandledExceptionFilter
HeapAlloc
SetEvent
LoadLibraryW
GetCommandLineW
FileTimeToLocalFileTime
GetProcessHeap
GlobalUnlock
CreateToolhelp32Snapshot
GlobalFree
WriteFile
GlobalLock
GlobalAlloc
GetSystemDefaultUILanguage
VirtualProtect
FileTimeToSystemTime
Process32NextW
MultiByteToWideChar
GetVersionExW
GetCurrentProcess
LockResource
GetModuleHandleW
WriteProcessMemory
WideCharToMultiByte
VirtualQueryEx
CreateFileA
GetProcAddress
ReadProcessMemory
LoadResource
SetLastError
SizeofResource
OpenThread
lstrcpynW
GetModuleFileNameW
GetLastError
FindResourceW
CloseHandle
GetTickCount
RaiseException
GetTempPathW
CreateDirectoryW
DeleteCriticalSection
CreateFileW
DeleteFileW
ReadFile
SetFilePointer
user32
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
SetForegroundWindow
GetMenu
PostMessageW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
DefWindowProcW
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
SetWindowsHookExW
CallNextHookEx
DispatchMessageW
PeekMessageW
ValidateRect
UnregisterClassA
GetFocus
GetDlgCtrlID
PtInRect
LoadCursorW
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
UnhookWindowsHookEx
GetParent
GetLastActivePopup
IsWindowEnabled
MessageBoxW
GetMenuState
GetMenuItemID
GetSubMenu
DestroyMenu
TrackPopupMenu
GetMenuItemCount
IsWindow
LoadIconW
GetDlgItem
LoadImageW
SetWindowLongW
GetWindowTextLengthW
GetWindowRect
SetDlgItemTextW
SendMessageW
GetWindow
MapWindowPoints
ClientToScreen
GetClientRect
SendDlgItemMessageW
EnableWindow
SetClipboardData
ShowWindow
GetKeyState
SetWindowPos
EmptyClipboard
CallWindowProcW
DrawIconEx
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
CloseClipboard
SetWindowTextW
RegisterClipboardFormatW
MapDialogRect
InvalidateRect
OpenClipboard
GetWindowThreadProcessId
GetWindowTextW
GetWindowLongW
EndDialog
GetClassNameW
EnableMenuItem
CheckMenuItem
RegisterWindowMessageW
WinHelpW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
CreatePopupMenu
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
CreateBitmap
ExtTextOutW
TextOutW
RectVisible
PtVisible
GetClipBox
SetMapMode
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
GetStockObject
SetTextColor
SelectObject
DeleteObject
Escape
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
advapi32
RegQueryValueExA
RegOpenKeyExW
RegQueryValueExW
RegOpenKeyExA
LookupPrivilegeValueW
RegCloseKey
AdjustTokenPrivileges
OpenProcessToken
shell32
ord155
SHBindToParent
SHGetDesktopFolder
SHGetFileInfoW
SHGetSpecialFolderPathW
ShellExecuteW
atl80
ord10
ord30
ole32
OleInitialize
OleUninitialize
DoDragDrop
CoUninitialize
CoCreateInstance
CoInitialize
CoFreeUnusedLibrariesEx
CoCreateGuid
oleaut32
VariantChangeType
SysAllocString
VariantInit
VariantClear
SysStringByteLen
SysAllocStringByteLen
SysStringLen
SysFreeString
netapi32
Netbios
NetApiBufferFree
NetWkstaTransportEnum
Sections
.text Size: 280KB - Virtual size: 276KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rmnet Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE