Static task
static1
Behavioral task
behavioral1
Sample
ac5db349289f9072aa6f949a3f965d61acea81e3af64fb24e6d6e28f2ce0fb88.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ac5db349289f9072aa6f949a3f965d61acea81e3af64fb24e6d6e28f2ce0fb88.exe
Resource
win10v2004-20220812-en
General
-
Target
ac5db349289f9072aa6f949a3f965d61acea81e3af64fb24e6d6e28f2ce0fb88
-
Size
267KB
-
MD5
1306d4e2aeb3fdaca5537a86e4baabcc
-
SHA1
060fdeb0266a52f666811dc050b1b2a38f4edce6
-
SHA256
ac5db349289f9072aa6f949a3f965d61acea81e3af64fb24e6d6e28f2ce0fb88
-
SHA512
d98e9d843196e246ef86e2a049c7ca583d60058f8b6da5fa2f14226667a139946427629ab2bdd64a1bb7e2e8dcffad397e1b2e1ccd2379a6f44ddea18df8f91e
-
SSDEEP
6144:aW1TtRHiUWPE/wl5AfpO6o74bJo+n0V1EEuki2fNM+5:aW1TtRbWPuwl5Atbpny6EuuNMs
Malware Config
Signatures
Files
-
ac5db349289f9072aa6f949a3f965d61acea81e3af64fb24e6d6e28f2ce0fb88.exe windows x86
034e9cfaeb0d4e9215a119531395c29e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_DrawIndirect
CreateMappedBitmap
ImageList_GetImageRect
ImageList_SetDragCursorImage
ImageList_Remove
CreatePropertySheetPageW
ImageList_EndDrag
InitCommonControlsEx
ImageList_GetIconSize
ImageList_SetImageCount
ImageList_Copy
ImageList_SetFlags
ImageList_SetIconSize
ImageList_BeginDrag
ImageList_Destroy
ImageList_LoadImageW
_TrackMouseEvent
CreateStatusWindowA
ImageList_DragEnter
ImageList_LoadImageA
kernel32
OpenMutexA
MapViewOfFile
MultiByteToWideChar
TerminateProcess
IsBadWritePtr
GetCurrentProcess
TlsAlloc
GetSystemTime
InterlockedExchange
SetWaitableTimer
TlsSetValue
VirtualAlloc
SystemTimeToFileTime
GetFileType
HeapReAlloc
CreateProcessA
LoadLibraryA
CompareStringA
GetSystemTimeAsFileTime
GetCurrentThreadId
OpenSemaphoreW
RtlUnwind
GetCalendarInfoW
DeleteAtom
FreeEnvironmentStringsA
HeapAlloc
SetHandleCount
CloseHandle
EnumResourceNamesA
GetCPInfo
GetTimeZoneInformation
FreeEnvironmentStringsW
lstrcatW
CreateMutexA
SetCriticalSectionSpinCount
InterlockedDecrement
GetModuleHandleA
GetStringTypeA
DeleteCriticalSection
HeapCreate
FlushFileBuffers
SetLastError
GetCommandLineW
lstrcat
ReadFile
LCMapStringW
GetTickCount
WideCharToMultiByte
GetCurrentThread
HeapDestroy
SetFilePointer
CompareStringW
GetCurrentProcessId
GetStartupInfoW
CreateMailslotW
VirtualFree
CreateDirectoryExW
FindFirstFileExW
SetConsoleTextAttribute
GetLocalTime
GetVersion
GetStringTypeW
InitializeCriticalSection
WaitForSingleObjectEx
WriteFile
LeaveCriticalSection
GetEnvironmentStringsW
SetStdHandle
HeapFree
GetModuleFileNameW
GetStdHandle
ExitProcess
GetStartupInfoA
GetCommandLineA
GetEnvironmentStrings
SetEnvironmentVariableA
InterlockedIncrement
GetDriveTypeA
LCMapStringA
SetConsoleTitleA
GetProcAddress
VirtualQuery
UnhandledExceptionFilter
TlsGetValue
QueryPerformanceCounter
lstrcmp
EnterCriticalSection
GetLastError
GetComputerNameW
WriteProfileStringW
TlsFree
GetLocaleInfoA
GetModuleFileNameA
user32
RegisterClassExA
MessageBoxW
RegisterClassA
DestroyWindow
ShowWindow
CreateWindowExW
GetProcessDefaultLayout
CharLowerBuffW
GetDlgCtrlID
DefWindowProcW
Sections
.text Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 53KB - Virtual size: 73KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ