Static task
static1
Behavioral task
behavioral1
Sample
ade6151da5f7563056f9d96d95283ee308ea5242cca44dcb7deefbd1ff3d220b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ade6151da5f7563056f9d96d95283ee308ea5242cca44dcb7deefbd1ff3d220b.exe
Resource
win10v2004-20221111-en
General
-
Target
ade6151da5f7563056f9d96d95283ee308ea5242cca44dcb7deefbd1ff3d220b
-
Size
174KB
-
MD5
439003e61fd4bb265917de7b8027a270
-
SHA1
75d6b5081be68d319027f25a18d2269a9c9935b1
-
SHA256
ade6151da5f7563056f9d96d95283ee308ea5242cca44dcb7deefbd1ff3d220b
-
SHA512
9a71b33fca69df5cc879524348a18c22e314ebd169cf822f52021cbfd68fab7bb967e02925c430b4a134ff34ce401656600d004e19c2299ed3003d720c47eaa7
-
SSDEEP
3072:5Za6hRIsEpF3D9cG0DFjj/GvFOxxm1863Zz8eBNLqL4PXGFxJdCtg0:bN3hEpZ970RjDO8xo6kZ3qLiXu
Malware Config
Signatures
Files
-
ade6151da5f7563056f9d96d95283ee308ea5242cca44dcb7deefbd1ff3d220b.exe windows x86
0bfea9b1759e9f6faf1e681e080e83b4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
OleRegGetUserType
CoGetObjectContext
ReleaseStgMedium
CoCreateGuid
StgCreateDocfileOnILockBytes
CoGetMalloc
user32
GetSystemMetrics
SetMenuItemInfoA
MapVirtualKeyA
GetDCEx
IsWindowEnabled
SetCursor
RegisterWindowMessageA
GetKeyNameTextA
CharToOemA
GetWindowTextA
GetClipboardData
UpdateWindow
PostMessageA
DeleteMenu
RedrawWindow
FrameRect
ShowWindow
DrawTextA
RemovePropA
ReleaseDC
TranslateMessage
ClientToScreen
OpenClipboard
SetPropA
GetScrollPos
SetForegroundWindow
UnhookWindowsHookEx
GetKeyboardLayoutNameA
SetWindowTextA
KillTimer
CharNextW
SetMenu
GetMessagePos
DispatchMessageA
OemToCharA
IsZoomed
MoveWindow
CallWindowProcA
RegisterClassA
SetParent
FindWindowA
SendMessageW
DrawAnimatedRects
SetCapture
EnableWindow
TrackPopupMenu
SetRect
PeekMessageA
SetScrollPos
DestroyIcon
ActivateKeyboardLayout
SetClassLongA
CreateWindowExA
CreatePopupMenu
DrawIcon
GetCursor
DrawMenuBar
GetActiveWindow
GetMenuStringA
PtInRect
GetLastActivePopup
SetActiveWindow
GetWindowLongA
SystemParametersInfoA
GetKeyboardState
GetSysColor
IsWindow
CharNextA
CreateMenu
AdjustWindowRectEx
GetScrollRange
TranslateMDISysAccel
GetKeyboardLayoutList
EmptyClipboard
GetDlgItem
EqualRect
GetSubMenu
DefMDIChildProcA
GetClassLongA
DestroyMenu
CharUpperBuffA
DestroyCursor
IsDialogMessageA
CharLowerA
SetClipboardData
GetWindowLongW
EnableScrollBar
MessageBoxA
WaitMessage
DefFrameProcA
SetScrollInfo
GetKeyboardType
GetParent
ReleaseCapture
EndPaint
SetWindowLongW
DrawIconEx
GetMenuItemID
RemoveMenu
GetDesktopWindow
MsgWaitForMultipleObjects
IsRectEmpty
SetScrollRange
CreateIcon
SetWindowPos
BeginPaint
SendMessageA
LoadBitmapA
IsDialogMessageW
GetWindowDC
GetKeyboardLayout
DefWindowProcA
ChildWindowFromPoint
SetWindowLongA
InvalidateRect
DrawFrameControl
GetIconInfo
LoadCursorA
EnumThreadWindows
GetScrollInfo
SetWindowPlacement
UnregisterClassA
GetClassInfoA
WindowFromPoint
PostQuitMessage
ScreenToClient
GetTopWindow
GetWindowPlacement
GetSysColorBrush
GetClientRect
LoadStringA
InsertMenuA
ScrollWindow
IsIconic
LoadIconA
GetWindowRect
IsWindowUnicode
GetDC
SetTimer
CallNextHookEx
InflateRect
EnumWindows
InsertMenuItemA
FillRect
CharLowerBuffA
CheckMenuItem
ShowOwnedPopups
wsprintfA
GetClassNameA
EnableMenuItem
DispatchMessageW
GetMenu
GetFocus
GetPropA
GetForegroundWindow
SetFocus
DrawEdge
GetSystemMenu
ShowScrollBar
OffsetRect
CloseClipboard
GetWindow
EnumChildWindows
GetCapture
DestroyWindow
PeekMessageW
GetCursorPos
GetKeyState
GetMenuItemInfoA
IsChild
GetWindowThreadProcessId
IsWindowVisible
MessageBeep
GetMenuItemCount
SetWindowsHookExA
GetMenuState
RegisterClipboardFormatA
msvcrt
calloc
memcpy
cos
kernel32
LoadLibraryA
GetFullPathNameA
HeapAlloc
SetLastError
LocalAlloc
GetSystemDefaultLangID
LockResource
GetStdHandle
FreeLibrary
GlobalDeleteAtom
GetStartupInfoA
FreeResource
CreateEventA
GetProcAddress
GetUserDefaultLCID
GetDiskFreeSpaceA
FindResourceA
GetLastError
GlobalAddAtomA
lstrcpyA
GetEnvironmentStrings
LoadLibraryExA
HeapFree
MulDiv
ExitThread
HeapDestroy
MoveFileExA
SetHandleCount
GlobalFindAtomA
GetLocalTime
Sleep
GetDateFormatA
lstrlenA
GetFileType
GetModuleFileNameA
GetVersion
FindFirstFileA
ExitProcess
WideCharToMultiByte
LoadResource
GetCPInfo
GetACP
GetCurrentThreadId
GetLocaleInfoA
LocalReAlloc
CreateFileA
lstrcmpA
WriteFile
lstrcatA
InitializeCriticalSection
SetErrorMode
MoveFileA
ReadFile
EnumCalendarInfoA
GetTickCount
GetProcessHeap
SetEndOfFile
VirtualFree
lstrcmpiA
SetThreadLocale
GetThreadLocale
CloseHandle
GetStringTypeA
GetVersionExA
LocalFree
RaiseException
CompareStringA
SetEvent
CreateThread
GetCurrentThread
VirtualAlloc
SizeofResource
DeleteFileA
FindClose
lstrcpynA
DeleteCriticalSection
GetOEMCP
VirtualAllocEx
GetModuleHandleA
WaitForSingleObject
FormatMessageA
GlobalAlloc
EnterCriticalSection
SetFilePointer
VirtualQuery
GetFileAttributesA
ResetEvent
GetCommandLineA
version
VerQueryValueA
GetFileVersionInfoSizeA
VerInstallFileA
Sections
.text Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.init Size: 7KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 941B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE