Static task
static1
Behavioral task
behavioral1
Sample
a4e898ab9daa4acbff8a47688977596bf45548e425bc722f0bb17dbd30c99e29.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a4e898ab9daa4acbff8a47688977596bf45548e425bc722f0bb17dbd30c99e29.exe
Resource
win10v2004-20220812-en
General
-
Target
a4e898ab9daa4acbff8a47688977596bf45548e425bc722f0bb17dbd30c99e29
-
Size
1.1MB
-
MD5
3077fb99ad6f6639fd0e473a46287690
-
SHA1
f9657c1201f8b1f748aa85b3ed970103c22956c1
-
SHA256
a4e898ab9daa4acbff8a47688977596bf45548e425bc722f0bb17dbd30c99e29
-
SHA512
338e86604b19234f44bcfe10f585d33e79fd95dca76184e1e25a173576c6a9d5f04ea34d4e562d6352a7e6c9b76facebdff054e711bc343bc2a83633c7458b03
-
SSDEEP
12288:OaFMBz91eZtka8+B+A7DpjGEMwD7+8+cosvIkJZ9AV3fF7VbeXpP7j:tcvot/Xo7i7+8+cosvI29A99JbAVj
Malware Config
Signatures
Files
-
a4e898ab9daa4acbff8a47688977596bf45548e425bc722f0bb17dbd30c99e29.exe windows x86
23aab175c0b809d1989ea2c4f43d3f72
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryExW
GetProcAddress
FreeLibrary
LoadLibraryW
CreateFileW
GetFileSize
ReadFile
MultiByteToWideChar
GetFileTime
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetPrivateProfileStringW
CreateMutexW
CreateThread
GetLocalTime
GetCommandLineW
GetTickCount
SetFilePointer
WriteFile
EnumResourceLanguagesW
GetUserDefaultLangID
GetUserDefaultUILanguage
GetVersion
ConvertDefaultLocale
GetLocaleInfoW
GetCurrentProcess
GetSystemInfo
GetSystemWow64DirectoryW
OpenProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
TerminateProcess
GetExitCodeProcess
GetVersionExW
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
RemoveDirectoryW
CreateEventW
SetEvent
MoveFileExW
SetEndOfFile
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
FlushFileBuffers
LoadLibraryA
GetOEMCP
GetACP
HeapSize
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetStartupInfoA
SetHandleCount
GetCurrentThreadId
GetFileType
GetModuleFileNameA
GetStdHandle
HeapCreate
SetErrorMode
MoveFileW
Sleep
GetFileAttributesW
CompareFileTime
CopyFileW
SetFileAttributesW
GetTempFileNameW
ExitProcess
GetTempPathW
DeleteFileW
GetEnvironmentVariableW
GetCurrentDirectoryW
GetSystemDirectoryW
VerSetConditionMask
GetWindowsDirectoryW
WaitForSingleObject
CreateProcessW
FindNextFileW
FindClose
FindFirstFileW
SetLastError
VerifyVersionInfoW
TlsGetValue
LocalFree
GetModuleFileNameW
WideCharToMultiByte
CloseHandle
GetLastError
CreateFileA
SizeofResource
LockResource
LoadResource
FindResourceW
HeapDestroy
HeapReAlloc
VirtualAlloc
VirtualFree
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetCPInfo
RtlUnwind
GetModuleHandleW
TlsFree
TlsSetValue
TlsAlloc
SetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
RaiseException
GetStartupInfoW
GetProcessHeap
GetVersionExA
GetModuleHandleA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetConsoleMode
GetConsoleCP
HeapFree
HeapAlloc
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
InterlockedExchange
InterlockedCompareExchange
LocalAlloc
user32
GetWindowLongW
GetDlgItem
SendMessageW
ShowWindow
EndDialog
SendDlgItemMessageW
KillTimer
MessageBoxW
DialogBoxParamW
LoadIconW
LoadImageW
SetRectEmpty
PostMessageW
EnableWindow
ReleaseDC
GetDC
SetFocus
DialogBoxIndirectParamW
SetWindowPos
GetClientRect
MonitorFromWindow
GetMonitorInfoW
OffsetRect
SetDlgItemTextW
AdjustWindowRect
GetWindowRect
SetWindowTextW
DrawTextW
MessageBoxIndirectW
SendMessageTimeoutW
ExitWindowsEx
EnumWindows
GetWindowThreadProcessId
GetWindowModuleFileNameW
LoadStringW
SetTimer
wsprintfW
gdi32
CreateFontW
GetStockObject
SetBkMode
SetTextColor
DeleteDC
GetTextExtentPoint32W
SelectObject
CreateCompatibleDC
DeleteObject
advapi32
OpenServiceW
RegQueryValueExW
RegCloseKey
GetNamedSecurityInfoW
SetNamedSecurityInfoW
RegCreateKeyExW
RegSetValueExW
RegEnumValueW
IsTextUnicode
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
OpenSCManagerW
QueryServiceStatus
DeleteService
ControlService
QueryServiceConfigW
StartServiceW
CloseServiceHandle
ChangeServiceConfigW
ChangeServiceConfig2W
CreateServiceW
RegEnumKeyExW
RegDeleteValueW
RegQueryInfoKeyW
RegDeleteKeyW
RegOpenKeyExW
shell32
SHCreateDirectoryExW
SHCreateDirectoryExA
SHGetFolderPathW
CommandLineToArgvW
ole32
CoCreateInstance
PropVariantClear
CLSIDFromString
CoUninitialize
CoInitialize
cabinet
ord22
ord23
ord20
ord21
setupapi
SetupDiGetDeviceRegistryPropertyW
SetupOpenInfFileW
SetupCloseInfFile
SetupFindFirstLineW
SetupGetLineTextW
SetupGetStringFieldW
SetupFindNextLine
SetupDiGetINFClassW
SetupDiGetClassDevsW
SetupDiEnumDeviceInfo
SetupDiSetClassInstallParamsW
SetupDiCallClassInstaller
SetupDiGetDeviceInstallParamsW
SetupDiDestroyDeviceInfoList
shlwapi
PathFindFileNameW
PathFindFileNameA
PathAddBackslashA
PathRemoveFileSpecA
PathAppendA
PathFileExistsW
SHDeleteKeyW
PathRenameExtensionW
PathMatchSpecA
PathStripToRootW
PathAddBackslashW
PathIsDirectoryW
SHStrDupW
PathRemoveBackslashW
PathIsRootW
PathIsSystemFolderW
PathRemoveFileSpecW
PathFindExtensionW
PathCombineW
PathAppendW
PathStripPathW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
psapi
GetModuleFileNameExW
EnumProcessModules
Sections
.text Size: 348KB - Virtual size: 346KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 668KB - Virtual size: 668KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE