Static task
static1
Behavioral task
behavioral1
Sample
afb6ce32309610751ac53a1b301ea10d5620d2859476353ac3697cd42fc39cb3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
afb6ce32309610751ac53a1b301ea10d5620d2859476353ac3697cd42fc39cb3.exe
Resource
win10v2004-20220812-en
General
-
Target
afb6ce32309610751ac53a1b301ea10d5620d2859476353ac3697cd42fc39cb3
-
Size
867KB
-
MD5
29caa25975182052a63f9c58c760dff0
-
SHA1
0ba2085bd345b081b9ac1c30f6c13fee4a6b3044
-
SHA256
afb6ce32309610751ac53a1b301ea10d5620d2859476353ac3697cd42fc39cb3
-
SHA512
c4e44e29cbe34f967133d093cf854f2bf518ed55f9f88f67b6099d18b76eff68b1c58d2eca6862585522574b480b2f187ee8996d8f5f5fc6a2e953471d8242b1
-
SSDEEP
12288:JUczwNvjMXltL6cSnsf5l2HXPdreQ7KwFIPOHiJKdQ2iua2EMIzj:JSv42cviXPdreQAuMMIzj
Malware Config
Signatures
Files
-
afb6ce32309610751ac53a1b301ea10d5620d2859476353ac3697cd42fc39cb3.exe windows x86
1be8f03372b5790610275da7955cf08c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
uxtheme
GetCurrentThemeName
kernel32
CreateDirectoryW
GetLastError
WideCharToMultiByte
GetCommandLineW
SetLastError
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetVersion
LoadLibraryA
LoadLibraryW
GetModuleFileNameW
OutputDebugStringA
RaiseException
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
GetCurrentProcess
FlushInstructionCache
GetUserDefaultUILanguage
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
GetVersionExW
SetEndOfFile
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetStdHandle
CreateFileA
GetLocaleInfoA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
InitializeCriticalSectionAndSpinCount
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetConsoleMode
GetConsoleCP
SetFilePointer
ReadFile
RtlUnwind
GetStartupInfoA
GetFileType
SetHandleCount
GetModuleFileNameA
GetStdHandle
WriteFile
HeapReAlloc
CloseHandle
GetFileSizeEx
CreateFileW
GetFileAttributesW
DeleteFileW
FindClose
FindNextFileW
FindFirstFileW
SystemTimeToFileTime
GetSystemTime
RemoveDirectoryW
MultiByteToWideChar
HeapCreate
HeapSize
InterlockedDecrement
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
InitializeCriticalSection
DeleteCriticalSection
InterlockedCompareExchange
HeapFree
GetProcessHeap
HeapAlloc
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
Sleep
ExitProcess
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
user32
CreateWindowExW
ClientToScreen
ReleaseDC
GetDC
GetNextDlgTabItem
UnregisterClassA
EndDialog
GetWindowTextW
GetWindowTextLengthW
SetFocus
DestroyWindow
SystemParametersInfoW
SetScrollPos
GetScrollInfo
EndPaint
BeginPaint
ScrollWindowEx
GetFocus
InvalidateRect
SetWindowPos
MapWindowPoints
GetWindowRect
SetScrollInfo
DialogBoxParamW
GetWindow
GetSysColor
GetDlgItem
SetWindowTextW
EnableWindow
ShowWindow
MoveWindow
CallWindowProcW
CreateDialogParamW
GetWindowLongW
DefWindowProcW
GetActiveWindow
MessageBoxW
SetWindowLongW
GetParent
FillRect
GetSysColorBrush
GetClientRect
SendMessageW
GetDesktopWindow
UpdateWindow
gdi32
GetTextExtentPoint32W
SelectObject
SetViewportOrgEx
SetBkColor
SetTextColor
advapi32
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
shell32
SHGetPathFromIDListW
SHBrowseForFolderW
ShellExecuteW
ShellExecuteExW
SHGetFolderPathW
SHFileOperationW
ole32
CoTaskMemFree
Sections
.text Size: 157KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 432KB - Virtual size: 431KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 192KB - Virtual size: 1.3MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE