Static task
static1
Behavioral task
behavioral1
Sample
5aab2d690aeb1f8ae84157b86c40d8990036783608da957e548697c0a65bfbee.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5aab2d690aeb1f8ae84157b86c40d8990036783608da957e548697c0a65bfbee.exe
Resource
win10v2004-20220812-en
General
-
Target
5aab2d690aeb1f8ae84157b86c40d8990036783608da957e548697c0a65bfbee
-
Size
324KB
-
MD5
0d37937edd4b3d82eb0c84e47cddf8e0
-
SHA1
26c653cb04155ac302fa37da1aa85d52177c4457
-
SHA256
5aab2d690aeb1f8ae84157b86c40d8990036783608da957e548697c0a65bfbee
-
SHA512
7dac1af668ab5a24940996675ad2bfd8974d1c809918388c22d98fa55e65ed0ffddfac194d6952601fc96b794a30a31c2fe4e4f47c83bd17c1b56ca3f8ba1079
-
SSDEEP
6144:ytmi3q2kT8XHIrUlp4OCSQk9KybV9zZpd943LWvvUXHJy:Hi6N3r0p4OCxMKybjzF9otXH
Malware Config
Signatures
Files
-
5aab2d690aeb1f8ae84157b86c40d8990036783608da957e548697c0a65bfbee.exe windows x86
ae5b948ca15c882c8b4c7dd5836ef084
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_ReplaceIcon
ImageList_Write
ImageList_Remove
ImageList_EndDrag
ImageList_Replace
ImageList_GetImageRect
DrawStatusText
ImageList_Destroy
ImageList_AddIcon
ImageList_LoadImageA
ImageList_DragMove
CreateToolbar
InitMUILanguage
CreateToolbarEx
ImageList_SetFilter
CreateStatusWindowW
InitCommonControlsEx
DrawStatusTextW
ImageList_DrawIndirect
ImageList_GetFlags
CreatePropertySheetPageA
user32
CreateIconFromResourceEx
AdjustWindowRectEx
CloseWindowStation
ChangeMenuW
SetWindowLongA
GetTabbedTextExtentA
GetScrollBarInfo
EnableScrollBar
IsDlgButtonChecked
PostThreadMessageW
DdeCmpStringHandles
GetNextDlgTabItem
DdeFreeDataHandle
SetClipboardData
ReuseDDElParam
EnumDesktopWindows
GetWindowTextLengthW
LoadAcceleratorsA
RegisterClassExA
GetMenuDefaultItem
EnumWindowStationsW
GetProcessDefaultLayout
IsIconic
GetKeyboardLayout
RegisterClassA
CreateAcceleratorTableW
GetClipboardData
DdeClientTransaction
HideCaret
AdjustWindowRect
ReleaseCapture
TranslateMessage
LoadMenuIndirectA
InvertRect
GetKeyboardLayoutList
InSendMessageEx
ClipCursor
DrawFocusRect
SendMessageTimeoutA
IsCharAlphaW
IsClipboardFormatAvailable
kernel32
GetLocalTime
VirtualQuery
InterlockedExchange
GetStringTypeW
GetSystemTime
GetWindowsDirectoryA
GetTimeFormatW
DeleteFileA
lstrcpy
ConnectNamedPipe
GetPrivateProfileStructW
EnumSystemLocalesW
GetEnvironmentStringsW
MoveFileExA
EnumCalendarInfoExA
ExitProcess
GetPrivateProfileSectionNamesA
DebugActiveProcess
WideCharToMultiByte
OpenMutexA
GetEnvironmentStrings
GetStartupInfoA
GetSystemDirectoryA
EnumSystemCodePagesW
HeapFree
GetFileType
QueryPerformanceCounter
GetDateFormatW
LoadLibraryA
GetDiskFreeSpaceA
CreateMutexA
CompareStringW
GetStdHandle
SetLastError
LCMapStringA
VirtualAlloc
SetComputerNameA
WriteProfileSectionW
GetExitCodeThread
GetThreadTimes
FillConsoleOutputAttribute
WriteProfileStringW
GetStartupInfoW
GetStringTypeA
ReadConsoleA
CreateToolhelp32Snapshot
UnhandledExceptionFilter
GetTimeZoneInformation
FlushFileBuffers
ReadConsoleOutputA
TlsSetValue
GetLongPathNameW
LCMapStringW
GetSystemTimeAdjustment
InitializeCriticalSection
CloseHandle
lstrcmp
FindResourceA
GetPrivateProfileSectionNamesW
SetCurrentDirectoryW
SetConsoleCtrlHandler
GetProfileIntA
GetDriveTypeW
GetACP
WriteConsoleInputW
EnumCalendarInfoExW
FreeEnvironmentStringsW
FindFirstFileExA
VirtualFree
LeaveCriticalSection
ReadFile
GetSystemInfo
HeapDestroy
GetCurrentThreadId
CreateProcessA
GetCurrentThread
EnterCriticalSection
GetProcessHeap
GetCurrencyFormatW
DeleteFiber
GetMailslotInfo
DeleteCriticalSection
GetLastError
IsBadWritePtr
GetOEMCP
GetCurrentProcess
CreateFileW
InterlockedDecrement
GetProcessHeaps
TerminateProcess
GetCPInfo
CreateDirectoryA
SetVolumeLabelW
WriteConsoleOutputCharacterA
SetEnvironmentVariableA
HeapReAlloc
MultiByteToWideChar
GetSystemDirectoryW
GetModuleFileNameA
GetPrivateProfileStringW
InterlockedIncrement
ExpandEnvironmentStringsW
FreeEnvironmentStringsA
IsDebuggerPresent
TlsFree
GlobalGetAtomNameA
GetProcAddress
GetModuleHandleA
GetThreadPriority
TlsGetValue
GlobalSize
HeapCreate
CompareStringA
AllocConsole
OpenSemaphoreW
GetFullPathNameA
ReadConsoleW
GetSystemTimeAsFileTime
GetVersion
WriteProfileStringA
LoadLibraryW
GetPrivateProfileStringA
GetTickCount
MapViewOfFileEx
RtlUnwind
GetCurrentProcessId
GetCommandLineA
SetFilePointer
SetStdHandle
TlsAlloc
DuplicateHandle
GetCommandLineW
LocalUnlock
FreeResource
InitializeCriticalSectionAndSpinCount
CreateDirectoryExW
SetConsoleWindowInfo
ReadConsoleOutputCharacterA
WriteFile
LoadLibraryExA
SetHandleCount
GetUserDefaultLangID
HeapAlloc
GetNumberFormatW
Sections
.text Size: 128KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ