Static task
static1
Behavioral task
behavioral1
Sample
ac62b90778ecadd04d7e13a35e544896e0cd1d78d1e4bd36a24a2227080d5dff.exe
Resource
win7-20221111-en
General
-
Target
ac62b90778ecadd04d7e13a35e544896e0cd1d78d1e4bd36a24a2227080d5dff
-
Size
410KB
-
MD5
3baa6aff832c42b6690f137ba98ac500
-
SHA1
ec94c035a2e26062ff3e579a42ce61c51acf60a1
-
SHA256
ac62b90778ecadd04d7e13a35e544896e0cd1d78d1e4bd36a24a2227080d5dff
-
SHA512
38125732cf255af3313161b4cc5eca9e32c9a0ae21c1ecf20128990bdb9f62aeb7598205ace76d6c4a3d4294c56ef47f517fab15dc50ca37ddb240111d566b2b
-
SSDEEP
6144:WLCmJBZIlmAMcohrUC5Zj6bxqzreJajd0Zd797jpBh+pv5m22n:WWmJBAMxrN5Zj6FqPe77jLhuvEj
Malware Config
Signatures
Files
-
ac62b90778ecadd04d7e13a35e544896e0cd1d78d1e4bd36a24a2227080d5dff.exe windows x86
1140570d6a52c076179925c7ab87f10f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
FlushInstructionCache
VirtualAlloc
GetCurrentThreadId
GetFileSize
SetFilePointer
FreeLibrary
InitializeCriticalSection
GetLocalTime
lstrlenW
LeaveCriticalSection
LoadLibraryW
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
EnterCriticalSection
ReadFile
GetModuleFileNameA
GlobalFree
GlobalAlloc
GlobalUnlock
RaiseException
GlobalLock
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
CreateFileA
GetConsoleMode
GetConsoleCP
InterlockedCompareExchange
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetCommandLineW
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapCreate
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
Sleep
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetCPInfo
InterlockedDecrement
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleA
RtlUnwind
GetStartupInfoW
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
LoadLibraryA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetVersionExA
DeleteCriticalSection
GetCurrentProcess
CreateProcessW
GetEnvironmentVariableW
ExitProcess
ResumeThread
WriteProcessMemory
VirtualAllocEx
VirtualProtectEx
SetLastError
TerminateProcess
GetExitCodeProcess
ReadProcessMemory
VirtualQueryEx
WaitForSingleObject
CopyFileW
FindResourceExW
GetTempPathW
FreeResource
WriteFile
CreateFileW
CloseHandle
GetProcAddress
GetModuleHandleW
GetVersionExW
DeleteFileW
GetLastError
FindClose
GetFileAttributesW
CreateDirectoryW
FindFirstFileW
GetModuleFileNameW
LockResource
FindResourceW
SizeofResource
LoadResource
user32
AttachThreadInput
SendMessageW
DefWindowProcW
SetRectEmpty
SetWindowLongW
SetCapture
GetMessageW
GetFocus
GetForegroundWindow
DrawIconEx
ReleaseCapture
DrawTextW
GetClientRect
CallWindowProcW
GetMonitorInfoW
IsWindow
GetWindowRect
EndPaint
GetScrollPos
CopyRect
FindWindowW
EqualRect
MapWindowPoints
PostThreadMessageW
OffsetRect
InvalidateRect
GetDC
PostMessageW
SetCursor
GetWindow
GetParent
GetKeyState
GetDlgItem
IsWindowEnabled
ReleaseDC
SetRect
LoadImageW
SetWindowPos
PtInRect
WindowFromPoint
SystemParametersInfoW
DrawFrameControl
MoveWindow
SetFocus
GetNextDlgTabItem
GetWindowLongW
UnregisterClassA
LoadCursorW
RegisterClassExW
GetActiveWindow
CreateWindowExW
EnableWindow
IsDialogMessageW
IsChild
SetForegroundWindow
GetWindowThreadProcessId
PeekMessageW
TranslateMessage
LoadBitmapW
SetActiveWindow
GetClassInfoExW
DispatchMessageW
MonitorFromWindow
GetDesktopWindow
ShowWindow
DestroyIcon
LoadIconW
BeginPaint
GetSystemMetrics
GetDlgCtrlID
UpdateLayeredWindow
InflateRect
IsWindowVisible
DestroyWindow
gdi32
RoundRect
SetBkColor
GetClipRgn
GetObjectW
CombineRgn
MoveToEx
LineTo
SetBkMode
StretchBlt
CreateBitmap
CreatePen
SelectClipRgn
SetTextColor
DeleteObject
CreateRectRgnIndirect
RestoreDC
TextOutW
RectInRegion
GetCurrentObject
CreateCompatibleDC
ExtTextOutW
SaveDC
GetStockObject
BitBlt
CreateRectRgn
GetTextExtentPoint32W
CreateDIBSection
GetTextColor
CreateFontIndirectW
SelectObject
SetStretchBltMode
Rectangle
DeleteDC
CreateCompatibleBitmap
advapi32
RegOpenKeyExW
RegSetValueExW
RegOpenKeyW
RegCloseKey
RegCreateKeyExW
RegQueryValueExW
RegQueryInfoKeyW
RegEnumValueW
shell32
SHGetPathFromIDListW
SHGetMalloc
SHGetSpecialFolderLocation
ShellExecuteW
SHGetSpecialFolderPathW
ole32
CoUninitialize
CoInitialize
CoCreateInstance
CreateStreamOnHGlobal
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
shlwapi
SHEnumKeyExW
PathAppendA
PathRemoveFileSpecA
PathFileExistsA
StrToIntW
PathAddBackslashW
PathAppendW
PathFileExistsW
PathRemoveFileSpecW
StrToIntA
comctl32
_TrackMouseEvent
msimg32
AlphaBlend
gdiplus
GdipCreateImageAttributes
GdipSetImageAttributesColorMatrix
GdipLoadImageFromStream
GdipImageRotateFlip
GdipDrawImageRectI
GdipDisposeImageAttributes
GdipCreateBitmapFromStream
GdipDrawImagePointsRectI
GdipCreateHBITMAPFromBitmap
GdipDrawImageRectRectI
GdipGetImageHeight
GdipAlloc
GdipFree
GdipCreateFontFromDC
GdipCreateFromHDC
GdipDeleteBrush
GdipCloneImage
GdipCreateFontFromLogfontW
GdipResetWorldTransform
GdipTranslateWorldTransform
GdipRotateWorldTransform
GdipDeleteGraphics
GdipSetStringFormatLineAlign
GdipCreateSolidFill
GdipDeleteFont
GdipDeleteStringFormat
GdipDrawString
GdipCloneBrush
GdipGetImageWidth
GdipSetStringFormatTrimming
GdipDisposeImage
GdipSetStringFormatAlign
GdipCreateStringFormat
GdipLoadImageFromFile
GdiplusStartup
GdiplusShutdown
Sections
.text Size: 220KB - Virtual size: 219KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 123KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE