Static task
static1
Behavioral task
behavioral1
Sample
aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc.exe
Resource
win10v2004-20220812-en
General
-
Target
aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc
-
Size
314KB
-
MD5
08ed3a82b107e945abbdf43a03f7bf06
-
SHA1
c1413fe082a18a5b895c9c8ddebb3b684cb22dd8
-
SHA256
aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc
-
SHA512
07a126e3584a1c0ee88d2ea31b2062191854e006fe2443d3e9f76ceee97213aecfce036ff96b7c0a9fd3971580d216bb74afac551ebdbfe936438ba689180fce
-
SSDEEP
6144:IYmRAwCvZWJDQKTARjABxuPZvFSZVdWeLVgfksUQft+YJ:ISwUZDMyB8Xh0Ua1J
Malware Config
Signatures
Files
-
aa12de4a71b15bbb05551b86fd159d34b08372496ecdac8712e6130151f4b3bc.exe windows x86
a236ddef9ee7321bd8bf76cef0a83a90
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetWindowDC
ScrollDC
GetWindow
OpenIcon
GetGuiResources
GetProcessWindowStation
GetTopWindow
GetWindowThreadProcessId
SendMessageA
PostMessageW
SendMessageW
GetDlgItem
SetWindowTextW
EndDialog
PostQuitMessage
DialogBoxParamW
GetWindowLongW
CharUpperW
CreateWindowExW
TranslateMessage
SetWindowLongW
PeekMessageW
MsgWaitForMultipleObjects
MessageBoxW
GetSystemMetrics
ExitWindowsEx
DispatchMessageW
DestroyWindow
CharUpperBuffW
CallWindowProcW
GetKeyboardType
LoadStringW
MessageBoxA
CharNextW
SetTimer
DialogBoxParamA
ShowWindow
GetScrollRange
DeleteMenu
FindWindowA
CharToOemBuffW
GetMessageA
SetFocus
IsWindowUnicode
SetWindowPos
IsHungAppWindow
AnyPopup
EmptyClipboard
shell32
CommandLineToArgvW
gdi32
GetTextCharsetInfo
PlayMetaFile
PatBlt
GetObjectW
GetLogColorSpaceA
Pie
RoundRect
ScaleViewportExtEx
GetWindowExtEx
GetBkColor
SelectClipPath
SaveDC
TranslateCharsetInfo
CombineTransform
GetEnhMetaFileDescriptionW
GetCharWidthFloatW
SetBitmapDimensionEx
GetDIBits
GetCharWidth32A
GetFontData
SetViewportOrgEx
dbghelp
UnDecorateSymbolName
crypt32
CryptMsgGetParam
CertFreeCertificateContext
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
netapi32
NetConnectionEnum
kernel32
CreateThread
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CompareStringW
LocalFree
QueryDosDeviceW
GetLogicalDriveStringsW
GetDriveTypeW
DeviceIoControl
MoveFileExW
GetSystemDirectoryW
CreateEventA
WriteConsoleA
WaitForMultipleObjects
FileTimeToSystemTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
DuplicateHandle
SetFilePointerEx
GlobalFree
GlobalAlloc
GetCommandLineA
InitializeCriticalSection
SetFileAttributesW
FreeEnvironmentStringsA
GetEnvironmentStrings
InterlockedIncrement
InterlockedDecrement
CompareStringA
LoadLibraryA
LCMapStringA
GetStringTypeA
GetLocaleInfoA
SetEnvironmentVariableW
GetStartupInfoW
SetUnhandledExceptionFilter
GetConsoleOutputCP
ExitThread
VirtualFree
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
ConvertThreadToFiber
GetFileInformationByHandle
RtlCaptureStackBackTrace
SetLastError
DeleteAtom
ConvertFiberToThread
SetFileValidData
SetEnvironmentVariableA
GetWindowsDirectoryW
CreateProcessA
CreateEventW
EnumResourceNamesW
HeapSetInformation
GetDiskFreeSpaceExW
FindResourceExW
ReleaseSemaphore
CloseHandle
GetStdHandle
RaiseException
RtlUnwind
UnhandledExceptionFilter
WriteFile
ExitProcess
FindClose
FindFirstFileW
FreeLibrary
GetCommandLineW
GetLocaleInfoW
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
GetStartupInfoA
GetThreadLocale
LoadLibraryExW
lstrcpynW
lstrlenW
MultiByteToWideChar
WideCharToMultiByte
VirtualQuery
GetCurrentThreadId
GetVersion
QueryPerformanceCounter
GetTickCount
GetSystemInfo
VirtualAlloc
Sleep
GetACP
LocalAlloc
TlsGetValue
TlsSetValue
CreateDirectoryW
CreateFileW
CreateProcessW
DeleteFileW
EnumCalendarInfoW
FindResourceW
FormatMessageW
GetCPInfo
GetCurrentProcess
GetDiskFreeSpaceW
GetEnvironmentVariableW
GetExitCodeProcess
GetFileAttributesW
GetFileSize
GetFullPathNameW
GetLastError
GetUserDefaultLangID
GetVersionExW
LoadLibraryW
LoadResource
LockResource
ReadFile
RemoveDirectoryW
ResetEvent
SetEndOfFile
SetErrorMode
SetEvent
SetFilePointer
SignalObjectAndWait
SizeofResource
VirtualProtect
WaitForSingleObject
GetProcessHeap
ExpandEnvironmentStringsW
SetCurrentDirectoryW
GetCurrentDirectoryW
FindNextFileW
SystemTimeToTzSpecificLocalTime
GetTimeZoneInformation
GetSystemTime
lstrlenA
GetComputerNameW
GetLocalTime
CreateFileA
FlushFileBuffers
WriteConsoleW
SetStdHandle
IsProcessorFeaturePresent
HeapReAlloc
HeapSize
GetStringTypeW
GetConsoleMode
GetConsoleCP
LCMapStringW
HeapAlloc
IsValidCodePage
GetOEMCP
HeapFree
IsDebuggerPresent
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
HeapCreate
TlsFree
TlsAlloc
Sections
.UJYHTGF Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.loikuty Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ikutyhg Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 339KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 207KB - Virtual size: 207KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ