Static task
static1
Behavioral task
behavioral1
Sample
aac4a78aaf82a0fbccd1c5c6593f19aa0f739c9be47fa26d9dd05dff73f458b2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aac4a78aaf82a0fbccd1c5c6593f19aa0f739c9be47fa26d9dd05dff73f458b2.exe
Resource
win10v2004-20220901-en
General
-
Target
aac4a78aaf82a0fbccd1c5c6593f19aa0f739c9be47fa26d9dd05dff73f458b2
-
Size
136KB
-
MD5
0e90b077e59cc31cf2071649056abd39
-
SHA1
ac34791282ab31ecdb2efe4af13ed30d62505069
-
SHA256
aac4a78aaf82a0fbccd1c5c6593f19aa0f739c9be47fa26d9dd05dff73f458b2
-
SHA512
5875e4d7e8985816d58488954484b3fefb3e2fd2a54e2576945543af6801b921435728dd5f108e86a31b37919f1a1e2bf6faf337b25759124166917539db674e
-
SSDEEP
3072:+UxVxQDgbPBn20Uoofu3UL1oomVpV6VStKjd1:tDpPBRofukaoonqdf
Malware Config
Signatures
Files
-
aac4a78aaf82a0fbccd1c5c6593f19aa0f739c9be47fa26d9dd05dff73f458b2.exe windows x86
349dce3c166e627d88a97c190f96a060
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
CreateThread
SetThreadPriority
CreateEventA
CreateProcessA
GetSystemDirectoryA
WritePrivateProfileStringA
GetExitCodeProcess
GetUserDefaultLCID
ExitThread
WaitForSingleObject
lstrcpyA
lstrlenA
GetCurrentProcess
FindResourceA
LoadResource
LockResource
FreeResource
LoadLibraryA
GetProcAddress
FreeLibrary
FormatMessageA
lstrcmpiA
GetModuleFileNameA
CreateMutexA
GetLastError
OpenEventA
SetEvent
CloseHandle
GetWindowsDirectoryA
GetPrivateProfileStringA
GetShortPathNameA
lstrcatA
GetFileAttributesA
GetVersionExA
WriteFile
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
LCMapStringW
FreeEnvironmentStringsA
MultiByteToWideChar
RtlUnwind
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
LocalFree
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
WideCharToMultiByte
GetFileType
GetStdHandle
SetHandleCount
HeapSize
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
TerminateProcess
ExitProcess
HeapReAlloc
HeapAlloc
HeapFree
SetFilePointer
FlushFileBuffers
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetStringTypeA
SetStdHandle
VirtualAlloc
GetStringTypeW
user32
BeginPaint
SendMessageA
EndPaint
DefWindowProcA
PostQuitMessage
SetCapture
UpdateWindow
ShowWindow
SetWindowPos
GetClientRect
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
PostMessageA
GetClassNameA
ReleaseCapture
DispatchMessageA
TranslateMessage
GetMessageA
LoadStringA
EnumWindows
GetDlgItem
ExitWindowsEx
GetSystemMetrics
MoveWindow
PostThreadMessageA
ReleaseDC
wsprintfA
DialogBoxParamA
GetWindowTextA
SetWindowTextA
CreateDialogParamA
GetWindowRect
ScreenToClient
IsDlgButtonChecked
SetCursor
DestroyWindow
MessageBoxA
EndDialog
GetDC
EnumChildWindows
FindWindowA
gdi32
CreateDIBitmap
SelectPalette
RealizePalette
CreatePalette
DeleteDC
SelectObject
CreateCompatibleDC
StretchBlt
GetObjectA
CreateFontIndirectA
GetTextExtentPoint32A
DPtoLP
GetDeviceCaps
CreateHalftonePalette
DeleteObject
advapi32
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
hpfinst
_ProcessExpandStringEx@20
_InitProcessStrings@0
_InitProcess@8
_SetProcessString@8
_ProcessExpandString@16
_Process@8
_DeInitProcess@12
Sections
.text Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.erdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE