Static task
static1
Behavioral task
behavioral1
Sample
a404ed461ae180e94e90b9b40974d4c8f7f3dfc598a6618c016320bd9668ee13.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a404ed461ae180e94e90b9b40974d4c8f7f3dfc598a6618c016320bd9668ee13.exe
Resource
win10v2004-20220812-en
General
-
Target
a404ed461ae180e94e90b9b40974d4c8f7f3dfc598a6618c016320bd9668ee13
-
Size
284KB
-
MD5
8381900d58c1b826b81f7d36204d9540
-
SHA1
6a3a6d44095195ac3eea5240984259e8dffef6d1
-
SHA256
a404ed461ae180e94e90b9b40974d4c8f7f3dfc598a6618c016320bd9668ee13
-
SHA512
8e9b0383873960ce89e8e9b9aef744eed7d5ad65a5061cc8e5794b8d74bf3782b2700b930a510c72cc5ca1a0383c6a2117e5315a501ac9e618a65954d1ff638d
-
SSDEEP
6144:HxY2K6hkSJbqPg78vBOHyiH3NXpJdplxaeiRTpBYP:HxY4NF8LwtZSTQ
Malware Config
Signatures
Files
-
a404ed461ae180e94e90b9b40974d4c8f7f3dfc598a6618c016320bd9668ee13.exe windows x86
be4ae13e30977e816611b61916ca4e76
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
_hread
CreateMutexA
GetCommConfig
GetDriveTypeA
GetEnvironmentVariableW
OpenFile
FreeLibraryAndExitThread
GetHandleInformation
GetTimeZoneInformation
AreFileApisANSI
FindResourceExA
CreateProcessA
GetCommandLineW
GlobalFindAtomW
GetWindowsDirectoryA
GetFileInformationByHandle
lstrcpyA
FlushFileBuffers
GetSystemTimeAdjustment
EnumCalendarInfoW
GetTickCount
lstrcmpA
SetErrorMode
GetFullPathNameA
GetAtomNameA
GetPrivateProfileStringA
ExitProcess
TryEnterCriticalSection
WritePrivateProfileStringA
GetCommandLineA
lstrlenA
VirtualAlloc
UnhandledExceptionFilter
user32
ScrollWindow
GetAsyncKeyState
SetCaretBlinkTime
LoadCursorFromFileW
CheckRadioButton
FindWindowExW
CopyRect
TrackPopupMenuEx
ToUnicode
GetWindowTextA
MonitorFromRect
SetUserObjectSecurity
SendMessageTimeoutW
SetRect
ShowScrollBar
SetCapture
ShowCursor
TabbedTextOutA
EnumDesktopsA
DialogBoxIndirectParamW
RegisterDeviceNotificationW
GetMenuItemRect
SetMenuInfo
GetSystemMetrics
CreateAcceleratorTableW
CharLowerA
RegisterHotKey
gdi32
CreateBitmapIndirect
GetGlyphOutlineA
PathToRegion
GetCharWidthA
GetSystemPaletteUse
CreatePalette
CreateRoundRectRgn
SetMapMode
GetObjectW
GetTextExtentExPointW
SetWinMetaFileBits
GetCharWidthW
comdlg32
ChooseColorW
GetSaveFileNameA
advapi32
CryptAcquireContextA
RegEnumKeyA
GetPrivateObjectSecurity
RegDeleteValueA
DeregisterEventSource
AddAccessDeniedAce
RegQueryValueExA
RegQueryInfoKeyA
CryptGetKeyParam
OpenServiceW
GetSidLengthRequired
SetServiceObjectSecurity
LockServiceDatabase
CryptGenKey
GetNamedSecurityInfoW
LookupPrivilegeNameA
LogonUserA
CryptVerifySignatureW
RegisterServiceCtrlHandlerW
DuplicateTokenEx
RegCloseKey
OpenEventLogW
SetSecurityDescriptorGroup
CryptSetProvParam
AddAccessAllowedAce
MakeSelfRelativeSD
RegSaveKeyA
BuildSecurityDescriptorW
shell32
SHBrowseForFolderA
ExtractIconExW
SHGetSpecialFolderLocation
SHFileOperationA
ShellExecuteA
ole32
CoMarshalInterface
CreateStreamOnHGlobal
CoGetClassObject
PropVariantCopy
oleaut32
SysAllocStringLen
LoadTypeLibEx
VariantCopy
SafeArrayGetLBound
QueryPathOfRegTypeLi
comctl32
ImageList_GetIcon
ImageList_DrawIndirect
ImageList_SetDragCursorImage
CreatePropertySheetPageA
shlwapi
PathRenameExtensionW
wnsprintfA
StrCpyW
PathCombineW
SHRegGetUSValueW
StrCmpNIA
PathFindExtensionW
PathUnquoteSpacesA
PathIsUNCServerW
PathGetCharTypeW
StrChrIW
UrlGetPartA
StrFormatByteSizeW
SHRegCreateUSKeyW
StrRChrA
StrToIntW
SHSetValueA
PathRemoveBlanksW
Sections
qskiyec Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
acmiec Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
agooge Size: 252KB - Virtual size: 251KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
maaymwu Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ