Static task
static1
Behavioral task
behavioral1
Sample
aa4c096973a5735c0be63944ef309a946edea99e92f1cd364583646c2587b887.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
aa4c096973a5735c0be63944ef309a946edea99e92f1cd364583646c2587b887.exe
Resource
win10v2004-20220812-en
General
-
Target
aa4c096973a5735c0be63944ef309a946edea99e92f1cd364583646c2587b887
-
Size
540KB
-
MD5
50e3b174c6602a4db2c42ec8efa3ce1a
-
SHA1
e37ccd06d931a204c774eec2c9718c245abf211d
-
SHA256
aa4c096973a5735c0be63944ef309a946edea99e92f1cd364583646c2587b887
-
SHA512
aa8431abbe5ba0a13125681073e0e18119fe867f1c354a71fdfd9a068a24b653885eb78032698e238f682a5d6a749133835f26630e0489d8d81d660dd8ee18b0
-
SSDEEP
12288:4GJgtajupbWOW23zc83PcPpjpotnqUFBJEWEWlhAj:4+Ya6bfW23whPpjpotnJMWlg
Malware Config
Signatures
Files
-
aa4c096973a5735c0be63944ef309a946edea99e92f1cd364583646c2587b887.exe windows x86
79c01421f6445c713f0179c222c9e808
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
RemovePropA
DdeUninitialize
CreateWindowExA
CountClipboardFormats
EnumDisplaySettingsW
DdeDisconnect
GetWindowLongW
wvsprintfA
DdeSetQualityOfService
GrayStringA
DefWindowProcA
GetClipboardFormatNameA
GetSysColorBrush
AdjustWindowRectEx
RegisterClassExA
WINNLSGetEnableStatus
SetWindowsHookExA
RegisterClassA
MessageBoxW
DestroyWindow
GetPropA
DrawMenuBar
ShowWindow
DdePostAdvise
GetMessageA
comctl32
ImageList_Duplicate
ImageList_Merge
ImageList_DragEnter
ImageList_SetFilter
ImageList_LoadImage
ImageList_GetImageInfo
ImageList_DragMove
InitCommonControlsEx
ImageList_GetImageRect
ImageList_ReplaceIcon
ImageList_BeginDrag
ImageList_SetOverlayImage
CreateMappedBitmap
ImageList_GetFlags
kernel32
GetCommandLineW
GetACP
GetVersionExA
SetLastError
ReadFile
HeapCreate
IsValidLocale
EnumSystemLocalesA
WideCharToMultiByte
EnumCalendarInfoA
GetUserDefaultLCID
GetLongPathNameW
UnhandledExceptionFilter
LeaveCriticalSection
GetModuleFileNameA
GetLastError
DeleteCriticalSection
GetTimeZoneInformation
GlobalUnlock
FlushFileBuffers
GetCPInfo
InitializeCriticalSection
VirtualAlloc
GetStartupInfoW
GetOEMCP
LCMapStringA
GetDateFormatA
GetEnvironmentStringsW
RtlUnwind
GetStringTypeA
TlsGetValue
ExitProcess
GetLocaleInfoA
VirtualFree
GetModuleFileNameW
CreateFileA
GetConsoleCP
WriteFile
HeapAlloc
GetFileType
GetStringTypeW
SetUnhandledExceptionFilter
HeapFree
GetLocaleInfoW
GetConsoleMode
GetEnvironmentStrings
WriteConsoleW
GetCommandLineA
SetFilePointer
CreateFileMappingW
SetConsoleCtrlHandler
GetProcAddress
GetTickCount
SetStdHandle
Sleep
CompareStringA
VirtualQuery
HeapReAlloc
LoadLibraryA
CreateMutexA
GetStartupInfoA
GlobalFindAtomW
FreeLibrary
GetCurrentProcess
GetTimeFormatA
TlsAlloc
SetHandleCount
LCMapStringW
TerminateProcess
InterlockedIncrement
IsDebuggerPresent
QueryPerformanceCounter
OpenMutexA
FillConsoleOutputCharacterW
HeapDestroy
SetEnvironmentVariableA
CompareStringW
MultiByteToWideChar
CloseHandle
HeapSize
FreeEnvironmentStringsW
GetSystemTimeAsFileTime
WriteConsoleA
TlsSetValue
InterlockedExchange
TlsFree
FreeEnvironmentStringsA
GetProcessHeap
GetStdHandle
GetConsoleOutputCP
EnterCriticalSection
GetCurrentThread
IsValidCodePage
GetCurrentProcessId
GetCurrentThreadId
InterlockedDecrement
GetModuleHandleA
Sections
.text Size: 371KB - Virtual size: 370KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 31KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 115KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ