Static task
static1
Behavioral task
behavioral1
Sample
5ace8be7b0a887d92d6747a9be0d1daf547b03742b9161125366a585ce7c1119.exe
Resource
win7-20220901-en
General
-
Target
5ace8be7b0a887d92d6747a9be0d1daf547b03742b9161125366a585ce7c1119
-
Size
2.4MB
-
MD5
da53b29c191d689db810bfde538e91be
-
SHA1
a978a120391b770adbea9d42d69fd6221ea23c70
-
SHA256
5ace8be7b0a887d92d6747a9be0d1daf547b03742b9161125366a585ce7c1119
-
SHA512
4b35c4cae24a1b7f2537f26baffc8dccd810b82642ae7a01dfaf0f7ba09446c41198984b16bea5b29b99d30005c8c4b2614c4792f15c61b03793e9ed9b3e10f1
-
SSDEEP
49152:RGlUL6smvJKpzo1qoEF2jbzkWgJpvuv5WNhx7Dhgrf:RGlULuJKp8EH2jb3
Malware Config
Signatures
Files
-
5ace8be7b0a887d92d6747a9be0d1daf547b03742b9161125366a585ce7c1119.exe windows x86
0181afd95fe7deeaa0f6929b68748ddc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
HeapDestroy
HeapAlloc
HeapReAlloc
HeapFree
HeapSize
GetProcessHeap
InitializeCriticalSectionAndSpinCount
GetCurrentDirectoryW
CreateDirectoryW
CreateFileW
GetFileAttributesW
LocalFileTimeToFileTime
ReadFile
SetFilePointer
SetFileTime
WriteFile
CloseHandle
SystemTimeToFileTime
WideCharToMultiByte
GetFileInformationByHandle
GetFileSize
GetLocalTime
GetTickCount
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
FileTimeToSystemTime
FindFirstFileW
FindNextFileW
OutputDebugStringW
lstrcmpW
lstrcpyW
lstrcatW
GetCommandLineW
DeleteFileW
FindClose
RemoveDirectoryW
SetFileAttributesW
WaitForSingleObject
Sleep
GetProcessTimes
GetCurrentProcess
ExitProcess
TerminateProcess
CreateProcessA
CreateProcessW
OpenProcess
GetSystemTime
IsWow64Process
GetModuleHandleExW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
FormatMessageA
QueryPerformanceCounter
QueryPerformanceFrequency
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
LocalFree
EncodePointer
LCMapStringEx
SetFileInformationByHandle
FlsAlloc
FlsGetValue
DeleteCriticalSection
FlsFree
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
InitOnceExecuteOnce
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
CreateEventExW
CreateSemaphoreExW
FlushProcessWriteBuffers
GetCurrentProcessorNumber
GetSystemTimeAsFileTime
GetTickCount64
FreeLibraryWhenCallbackReturns
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
CreateThreadpoolTimer
SetThreadpoolTimer
WaitForThreadpoolTimerCallbacks
CloseThreadpoolTimer
CreateThreadpoolWait
SetThreadpoolWait
CloseThreadpoolWait
GetModuleHandleW
GetProcAddress
GetFileInformationByHandleEx
CreateSymbolicLinkW
CompareStringEx
GetCPInfo
GetLocaleInfoEx
IsDebuggerPresent
GetFullPathNameW
GetDriveTypeW
GetSystemInfo
HeapValidate
TlsFree
TlsSetValue
SetEndOfFile
TlsGetValue
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
InitializeCriticalSectionEx
SetLastError
GetLastError
RaiseException
GetFileAttributesExW
SetCurrentDirectoryW
GetTimeZoneInformation
MoveFileExW
ReadConsoleW
SetFilePointerEx
TlsAlloc
InterlockedFlushSList
InterlockedPushEntrySList
LoadLibraryExW
RtlUnwind
LoadLibraryW
GetFileSizeEx
FlushFileBuffers
GetConsoleMode
GetConsoleOutputCP
SetStdHandle
EnumSystemLocalesW
FlsSetValue
DecodePointer
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
SetConsoleCtrlHandler
WriteConsoleW
GetFileType
HeapQueryInformation
GetCurrentThread
GetCommandLineA
GetStdHandle
SystemTimeToTzSpecificLocalTime
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
VirtualQuery
FreeLibrary
GetCurrentProcessId
GetCurrentThreadId
InitializeSListHead
OutputDebugStringA
GetModuleFileNameW
GetModuleHandleA
FindFirstFileExW
user32
ShowWindow
SetWindowPos
FindWindowW
SendMessageW
GetClassNameW
GetWindowThreadProcessId
GetWindow
wsprintfW
GetDesktopWindow
IsWindowVisible
UnregisterClassW
EnumWindows
advapi32
RegOpenKeyExW
RegSetValueExW
RegCloseKey
ole32
CoInitialize
CoCreateInstance
CoUninitialize
shell32
CommandLineToArgvW
oleaut32
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreate
SysAllocString
SafeArrayPutElement
GetErrorInfo
VariantClear
VariantInit
VariantChangeType
SetErrorInfo
CreateErrorInfo
SysFreeString
shlwapi
PathFileExistsW
mscoree
CorBindToRuntimeEx
CLRCreateInstance
gdi32
DeleteDC
ws2_32
socket
send
closesocket
connect
htons
WSAGetLastError
WSACleanup
WSAStartup
gethostbyname
inet_addr
recv
gethostbyaddr
gdiplus
GdiplusShutdown
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.key Size: 272KB - Virtual size: 272KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 327KB - Virtual size: 326KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 29KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 1024B - Virtual size: 777B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.00cfg Size: 512B - Virtual size: 265B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 252KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ