Static task
static1
Behavioral task
behavioral1
Sample
a0a9fd77677dbcc15b82c43c4afad4c9baccf19608c215bb5eb0f42a5cc6ab22.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a0a9fd77677dbcc15b82c43c4afad4c9baccf19608c215bb5eb0f42a5cc6ab22.exe
Resource
win10v2004-20220812-en
General
-
Target
a0a9fd77677dbcc15b82c43c4afad4c9baccf19608c215bb5eb0f42a5cc6ab22
-
Size
127KB
-
MD5
1337f65faf1817ab41a63ed73c3985e1
-
SHA1
86050c6115d180e80e9ed4f99fc4dfbb6e848227
-
SHA256
a0a9fd77677dbcc15b82c43c4afad4c9baccf19608c215bb5eb0f42a5cc6ab22
-
SHA512
8f4242b677cc9f648834ddd48e0f9a3dd526f7527d3ec1353badf72b5483c1b93a1e85b6bad2c6530f5889aa55e0ee48b11985f7db894645e212f184c1f12672
-
SSDEEP
3072:9TwYNuZQxBkYzm9sREA2Q9DNIXBKAM4WHV0cyN8FetTB8bSWuZ:9TwYRBg9sR4s5IRaLH2H8iB8bF
Malware Config
Signatures
Files
-
a0a9fd77677dbcc15b82c43c4afad4c9baccf19608c215bb5eb0f42a5cc6ab22.exe windows x86
e1f2627e5739c9adf173aeb7d2f1ddcd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
SetFilePointer
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
lstrcatA
IsBadReadPtr
GetTickCount
GetCurrentThread
CloseHandle
GetPrivateProfileStringA
SetEndOfFile
LockResource
HeapDestroy
GlobalUnlock
InterlockedDecrement
GlobalMemoryStatus
GlobalAlloc
RemoveDirectoryA
GetModuleFileNameA
GetStartupInfoA
ReadFile
GetVersion
GetCurrentThreadId
lstrcmpA
GetFileSize
GetSystemInfo
SetFileAttributesA
DeleteCriticalSection
WaitForSingleObject
lstrlenW
Sleep
GetFileTime
GetProcAddress
ResumeThread
LoadLibraryA
GetComputerNameA
GetLastError
LocalAlloc
GlobalLock
InterlockedExchange
MoveFileA
FileTimeToSystemTime
GetVersionExA
SetThreadPriority
GetLocaleInfoA
GetVolumeInformationA
GetDiskFreeSpaceA
CreateFileMappingA
GetTempPathA
GetThreadPriority
GetModuleHandleA
FindResourceA
WritePrivateProfileStringA
WriteFile
GlobalFree
GetFileAttributesA
CreateMutexA
InterlockedIncrement
FormatMessageA
MapViewOfFile
CreateProcessA
SystemTimeToFileTime
ExitProcess
HeapAlloc
GetCurrentProcess
HeapCreate
LoadLibraryExA
VirtualProtect
LocalFree
UnmapViewOfFile
SetFileTime
EnterCriticalSection
GetSystemTime
InitializeCriticalSection
lstrcpyA
LoadResource
FreeLibrary
user32
GetWindowLongA
GetWindowRect
DeleteMenu
GetSysColor
MapWindowPoints
GetSystemMetrics
FillRect
DrawFrameControl
RegisterClipboardFormatA
SystemParametersInfoA
PeekMessageA
IsIconic
GetTopWindow
GetKeyState
GetMenuDefaultItem
GetNextDlgTabItem
PostThreadMessageA
SetCursor
SetMenuDefaultItem
DrawEdge
CallNextHookEx
DestroyMenu
CreateWindowExA
RegisterWindowMessageA
ModifyMenuA
IntersectRect
CreateCaret
HideCaret
PostQuitMessage
RedrawWindow
BeginDeferWindowPos
GetActiveWindow
DrawIconEx
IsRectEmpty
ShowCaret
ReleaseCapture
DeferWindowPos
GetCursorPos
OffsetRect
SetRectEmpty
GetWindow
CopyRect
GetSubMenu
InsertMenuA
ScreenToClient
SetMenuItemInfoA
EndDeferWindowPos
GetMenu
LoadCursorA
InvalidateRect
LoadImageA
InflateRect
wvsprintfA
GetSystemMenu
WindowFromPoint
ClientToScreen
GetParent
ReleaseDC
GetClientRect
AdjustWindowRectEx
SendMessageA
SetParent
GetMessagePos
EqualRect
UpdateWindow
DestroyCaret
SetWindowContextHelpId
GetDC
PostMessageA
PtInRect
SetRect
GetMenuItemCount
GetCapture
SetCaretPos
GetMessageA
SetTimer
GetDCEx
EnableMenuItem
KillTimer
IsMenu
GetMenuItemInfoA
UnhookWindowsHookEx
FlashWindow
IsZoomed
SetForegroundWindow
LockWindowUpdate
WaitMessage
SetCapture
TrackPopupMenu
UnionRect
CheckMenuItem
BringWindowToTop
GetMenuStringA
DispatchMessageA
GetMenuItemID
SetWindowsHookExA
GetDlgCtrlID
MessageBoxA
EnableWindow
GetMenuState
GetClassLongA
AppendMenuA
IsWindow
RemoveMenu
DrawTextA
MapDialogRect
CreatePopupMenu
LoadMenuA
LoadBitmapA
GetDesktopWindow
IsWindowVisible
SetWindowPos
shell32
SHFileOperationA
SHBrowseForFolderA
ShellExecuteA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ole32
StringFromCLSID
StringFromGUID2
CoTaskMemFree
CoGetClassObject
CLSIDFromString
CoCreateGuid
oleaut32
SysFreeString
VariantClear
SysAllocStringLen
comctl32
ImageList_SetBkColor
ImageList_AddMasked
ord8
ImageList_BeginDrag
ImageList_DragLeave
ImageList_GetImageCount
ImageList_EndDrag
ImageList_DragEnter
shlwapi
wnsprintfA
wininet
InternetAutodialHangup
InternetGetConnectedState
wsock32
ntohs
WSAAsyncSelect
shutdown
recv
htons
gethostbyname
getpeername
connect
send
bind
inet_addr
accept
socket
ioctlsocket
WSAGetLastError
closesocket
getsockname
listen
WSASetLastError
oledlg
ord7
msvcrt
__dllonexit
__CxxFrameHandler
?terminate@@YAXXZ
exit
clock
vsprintf
??1type_info@@UAE@XZ
fseek
wcslen
_chdir
longjmp
malloc
isdigit
_CxxThrowException
strncat
ctime
_purecall
fgets
free
_ftime
memmove
_acmdln
localtime
_chdrive
atol
_onexit
_mbschr
_fstat
atoi
__setusermatherr
time
_mbsinc
atof
_mbctoupper
gmtime
_itoa
sprintf
_open
__RTDynamicCast
_setjmp3
fclose
__getmainargs
_lseek
__p__fmode
_XcptFilter
_close
_except_handler3
isalnum
_CIpow
fopen
qsort
_strdup
rand
fprintf
isalpha
_ftol
floor
_initterm
_setmbcp
__set_app_type
strncpy
_exit
??8type_info@@QBEHABV0@@Z
wcscpy
_adjust_fdiv
_endthread
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 59KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ