Static task
static1
Behavioral task
behavioral1
Sample
ad55bd269d7605dbd0009d9f55c742ec7480bff1d59435275b8e9cb1fdf079a6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ad55bd269d7605dbd0009d9f55c742ec7480bff1d59435275b8e9cb1fdf079a6.exe
Resource
win10v2004-20220812-en
General
-
Target
ad55bd269d7605dbd0009d9f55c742ec7480bff1d59435275b8e9cb1fdf079a6
-
Size
860KB
-
MD5
9284581fa3248a8b25ab5f9c07f882a8
-
SHA1
dfcaf817f20f0c5ab6b7ce7f0eebeb77cacb8392
-
SHA256
ad55bd269d7605dbd0009d9f55c742ec7480bff1d59435275b8e9cb1fdf079a6
-
SHA512
a8056ebf5670ce10d414a587549d65b11bb7f2d3f72e0a0f27a0e1dc85b2c9fe19a45bafea8e8dff28a972b932081806aaf8f33f0cf3d74955ffbf42ff41dd9f
-
SSDEEP
24576:y42qomAJxOKA/lUE4wVcZYV3+0egjLHgZpJEcnom:yfqoRwUE4wVciVAgjLHkJEcnom
Malware Config
Signatures
Files
-
ad55bd269d7605dbd0009d9f55c742ec7480bff1d59435275b8e9cb1fdf079a6.exe windows x86
7c262ec6779b60815b18e40601d797ec
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueW
GetFileVersionInfoSizeW
VerQueryValueA
GetFileVersionInfoW
secur32
GetUserNameExW
msvcr80
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
_controlfp_s
_invoke_watson
_crt_debugger_hook
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
_vsnprintf_s
_except_handler4_common
__set_app_type
_encode_pointer
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
fopen_s
fwprintf_s
fclose
vsprintf_s
wcscpy_s
vswprintf_s
wcsrchr
_wtoi
_CxxThrowException
_vsnprintf
__CxxFrameHandler3
_CIsqrt
memmove
_wcsnicmp
tolower
strncmp
ceil
strchr
strncpy_s
_strnicmp
wcsncmp
_stricmp
wcstok_s
swprintf_s
_wcsicmp
memset
memcpy
wcschr
_time32
advapi32
GetSecurityDescriptorDacl
RegQueryInfoKeyW
ReportEventW
RegisterEventSourceW
ReportEventA
DeregisterEventSource
GetUserNameA
RegQueryInfoKeyA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
SetNamedSecurityInfoW
ConvertSidToStringSidA
ConvertStringSecurityDescriptorToSecurityDescriptorA
RegCreateKeyExA
RegDeleteValueW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegOpenKeyExW
RegCreateKeyExW
RegEnumKeyW
RegEnumValueW
GetLengthSid
AddAccessAllowedAce
AddAccessDeniedAce
InitializeAcl
AllocateAndInitializeSid
CopySid
OpenThreadToken
IsValidSid
CheckTokenMembership
ConvertStringSecurityDescriptorToSecurityDescriptorW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
OpenProcessToken
GetTokenInformation
comctl32
ImageList_ReplaceIcon
ImageList_Create
ImageList_Destroy
ord17
gdi32
DeleteDC
RestoreDC
DeleteObject
GetTextFaceA
SelectObject
CreateFontA
GetDeviceCaps
SetMapMode
SaveDC
CreateFontIndirectW
GetObjectW
GetTextExtentPoint32W
SetTextAlign
GetTextMetricsA
GetObjectA
ExtTextOutW
SetBkMode
SetTextColor
GetTextFaceW
GetOutlineTextMetricsA
CreateDCA
CreateSolidBrush
TranslateCharsetInfo
CreateFontIndirectA
kernel32
OpenSemaphoreA
CreateEventA
OpenEventA
GetShortPathNameA
LoadLibraryW
OutputDebugStringA
LoadLibraryExW
LocalAlloc
GlobalFree
GetCurrentThreadId
CreateProcessA
GlobalAlloc
DuplicateHandle
GetSystemDirectoryW
GetTimeZoneInformation
GetDiskFreeSpaceExW
GetUserDefaultLCID
IsValidLocale
GetStringTypeExW
IsValidCodePage
CompareStringW
GetShortPathNameW
GetLongPathNameW
CreateFileA
GetCurrentThread
GlobalMemoryStatus
ReleaseSemaphore
IsProcessorFeaturePresent
EnumUILanguagesW
EnumSystemLocalesW
GetCalendarInfoW
GetUserDefaultUILanguage
VirtualProtect
QueryPerformanceCounter
GetTempFileNameA
GetTempPathA
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoA
UnhandledExceptionFilter
IsDebuggerPresent
lstrcmpiW
GetThreadContext
GetThreadTimes
GetPriorityClass
HeapDestroy
HeapCreate
TerminateThread
GetThreadSelectorEntry
GetLastError
GetLocalTime
LeaveCriticalSection
EnterCriticalSection
GetCommandLineW
ReleaseMutex
WaitForSingleObject
WaitForMultipleObjects
SetProcessWorkingSetSize
GetCurrentProcess
Sleep
TerminateProcess
DeleteFileW
CreateThread
CloseHandle
GetCurrentProcessId
SetUnhandledExceptionFilter
GetProcAddress
GetModuleHandleA
MapViewOfFile
GetVersionExW
GetVersionExA
GetModuleFileNameW
FreeLibrary
InitializeCriticalSection
GetProcessHeap
DeleteCriticalSection
MultiByteToWideChar
GetSystemTimeAsFileTime
GetTimeFormatW
GetDateFormatW
GetTickCount
SetLastError
LocalFree
WriteFile
FindNextFileW
FindClose
FindFirstFileW
GetSystemWindowsDirectoryW
MoveFileW
SetFilePointer
GetComputerNameA
SetPriorityClass
UnmapViewOfFile
GetFileSize
CreateFileMappingA
SuspendThread
ExitThread
MulDiv
GetModuleFileNameA
LoadLibraryA
GetSystemDefaultLangID
GetSystemDefaultUILanguage
GetUserDefaultLangID
GetACP
GetSystemDefaultLCID
SetEvent
CreateProcessW
ExpandEnvironmentStringsW
WideCharToMultiByte
GetTempPathW
GetFileAttributesW
SetEndOfFile
IsDBCSLeadByte
GetSystemDirectoryA
SetThreadPriority
CreateRemoteThread
OpenProcess
LoadLibraryExA
SetEnvironmentVariableA
CreateDirectoryW
ReadProcessMemory
VirtualQueryEx
GetSystemInfo
HeapFree
HeapSize
HeapValidate
HeapAlloc
HeapReAlloc
VirtualAlloc
RaiseException
TlsSetValue
SetFileAttributesW
CreateSemaphoreA
FlushFileBuffers
ResumeThread
InitializeCriticalSectionAndSpinCount
TlsAlloc
VirtualFree
TlsGetValue
TlsFree
GetModuleHandleW
GetVersion
GetFileType
CreateFileW
GetLocaleInfoW
GetProcessTimes
CreateMutexA
OpenMutexA
GetThreadPriority
ole32
StringFromIID
CoTaskMemFree
CoUninitialize
CoInitializeEx
CoCreateInstance
oleacc
CreateStdAccessibleObject
LresultFromObject
oleaut32
SysFreeString
SystemTimeToVariantTime
VariantTimeToDosDateTime
SysAllocString
SysStringLen
rpcrt4
UuidCreate
shell32
ExtractIconExA
SHGetSpecialFolderPathW
ShellExecuteExA
shlwapi
AssocQueryStringW
UrlGetPartA
wnsprintfA
urlmon
CreateURLMoniker
user32
GetDlgCtrlID
IsWindow
CreateDialogIndirectParamA
DrawTextA
DrawTextW
MapDialogRect
CallWindowProcA
MoveWindow
GetKeyboardLayout
GetMenuCheckMarkDimensions
LoadBitmapA
GetMonitorInfoA
CallWindowProcW
SetRectEmpty
IsWindowVisible
PostMessageA
SendMessageA
DefWindowProcA
SetTimer
KillTimer
PostQuitMessage
DispatchMessageA
TranslateMessage
IsDialogMessageA
GetMessageA
CreateWindowExA
RegisterClassExA
DialogBoxParamA
SystemParametersInfoA
DestroyIcon
LoadStringW
DestroyWindow
SetWindowPos
GetWindowRect
GetWindowLongA
SetForegroundWindow
GetSystemMetrics
LoadIconA
SetWindowLongA
ReleaseDC
FillRect
GetSysColorBrush
MapWindowPoints
GetDC
SetWindowTextA
CreateDialogParamW
DialogBoxParamW
EnumDisplayMonitors
GetDlgItem
DrawIconEx
ShowWindow
LoadCursorA
GetClientRect
SetCursor
DrawFocusRect
SetWindowTextW
GetWindow
InvalidateRect
EnableWindow
GetSysColor
SendDlgItemMessageA
EndDialog
CheckDlgButton
SetFocus
LoadStringA
IsDlgButtonChecked
SetDlgItemTextA
GetScrollInfo
SetScrollInfo
GetFocus
FlashWindowEx
GetForegroundWindow
GetWindowPlacement
IsIconic
GetWindowThreadProcessId
EnumWindows
SendMessageTimeoutA
GetParent
UpdateWindow
IsWindowUnicode
GetClassNameA
SendMessageW
GetWindowLongW
wininet
InternetGetConnectedState
InternetCloseHandle
HttpQueryInfoA
InternetReadFileExA
HttpEndRequestA
InternetWriteFile
HttpSendRequestExA
InternetCanonicalizeUrlA
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetSetStatusCallback
InternetCrackUrlA
Sections
.text Size: 552KB - Virtual size: 551KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 199KB - Virtual size: 310KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.0data Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE