Static task
static1
Behavioral task
behavioral1
Sample
ac17f70e56b3651ce3cedd520cb16cb7bc817b5d8ffc59d73cc7ffc82fd91bbd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ac17f70e56b3651ce3cedd520cb16cb7bc817b5d8ffc59d73cc7ffc82fd91bbd.exe
Resource
win10v2004-20220901-en
General
-
Target
ac17f70e56b3651ce3cedd520cb16cb7bc817b5d8ffc59d73cc7ffc82fd91bbd
-
Size
340KB
-
MD5
c50d80b9f9abab0c8d6e194cde6fcd0a
-
SHA1
e9da2ed428e2f0430da507c4697dee5ce27c18a2
-
SHA256
ac17f70e56b3651ce3cedd520cb16cb7bc817b5d8ffc59d73cc7ffc82fd91bbd
-
SHA512
f98371fc39edaa3f629dc3b04758b17f9ce305844a07c26576a8fee06b7b0910d6d618b188389603b105b9612ebd17f8e595d84464cd626c6457cfe8642d08e2
-
SSDEEP
6144:hfpOXyRydpzTeXykNdSA0sHFtyQ7hGfij7:hqy8dFhqBhGa
Malware Config
Signatures
Files
-
ac17f70e56b3651ce3cedd520cb16cb7bc817b5d8ffc59d73cc7ffc82fd91bbd.exe windows x86
057f19db2601588086fe67cc5e8ab1b8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
ReportEventA
RegCreateKeyExA
RegEnumValueA
RegQueryMultipleValuesA
DuplicateToken
CryptHashSessionKey
CryptCreateHash
CreateServiceA
RegEnumKeyW
user32
DdeClientTransaction
SetWinEventHook
VkKeyScanA
TileChildWindows
GetDialogBaseUnits
IsCharUpperW
CreateWindowExW
CreateDesktopA
SetWindowPlacement
WindowFromPoint
RegisterClassA
SetUserObjectInformationA
CreateMenu
IsCharUpperA
WINNLSGetEnableStatus
GetCursor
SystemParametersInfoA
SetMenuItemBitmaps
SendMessageA
GetScrollInfo
MessageBoxA
OpenInputDesktop
DrawTextW
EnumWindows
GetThreadDesktop
GetWindowLongA
DestroyWindow
AnyPopup
SetCursor
GetSystemMetrics
SetLastErrorEx
UnregisterHotKey
DdeQueryStringA
MessageBoxIndirectA
DefWindowProcA
EndPaint
ShowWindow
SetMenu
GetActiveWindow
SetPropW
GetDlgItemTextW
RegisterClassExA
GetMenuInfo
DdeReconnect
InternalGetWindowText
SetClipboardViewer
UnregisterClassA
EnumWindowStationsA
SetCaretBlinkTime
InSendMessage
OemToCharBuffA
SetWindowContextHelpId
comdlg32
PrintDlgA
comctl32
InitCommonControlsEx
ImageList_AddIcon
DrawStatusTextA
ImageList_AddMasked
CreatePropertySheetPage
ImageList_Add
ImageList_DragEnter
ImageList_DragMove
CreateUpDownControl
ImageList_SetFilter
gdi32
DescribePixelFormat
GetTextAlign
PlayEnhMetaFile
GetLayout
AddFontResourceA
CloseFigure
shell32
SHGetPathFromIDListA
kernel32
TerminateProcess
CreateToolhelp32Snapshot
GetCurrencyFormatW
EnumSystemLocalesA
GetCurrencyFormatA
TlsGetValue
GetNamedPipeHandleStateA
GetCommandLineW
GetDateFormatW
GetTickCount
UnhandledExceptionFilter
GetEnvironmentStrings
GetShortPathNameW
GetCurrentThread
VirtualFree
WritePrivateProfileStringW
InitializeCriticalSectionAndSpinCount
InitializeCriticalSection
QueryPerformanceCounter
GetTimeZoneInformation
VirtualAlloc
SetLastError
GetProfileStringW
LocalFree
EnumSystemCodePagesA
WaitForSingleObjectEx
LocalAlloc
GetProfileSectionW
CreateProcessW
HeapAlloc
GetStringTypeA
OpenMutexW
WriteFile
GetSystemTimeAsFileTime
GetCurrentProcess
DeleteCriticalSection
SetHandleCount
GetDriveTypeW
CreateMutexA
LoadLibraryExA
FreeEnvironmentStringsA
CreateFileA
GetProcAddress
GlobalGetAtomNameA
WriteProfileSectionA
GetThreadContext
CloseHandle
FlushFileBuffers
lstrcpynW
InterlockedIncrement
GlobalUnlock
MultiByteToWideChar
GetModuleHandleA
HeapCreate
SetLocaleInfoA
FlushViewOfFile
EnumSystemLocalesW
IsBadWritePtr
GetStringTypeW
GetFileType
GetVolumeInformationA
CreateFileMappingA
GetPrivateProfileStringW
GetCurrentProcessId
GetStdHandle
HeapFree
GetVersion
HeapDestroy
TlsAlloc
GetProfileStringA
ReadFile
DebugActiveProcess
LoadLibraryW
InterlockedDecrement
FillConsoleOutputCharacterW
LCMapStringA
TlsSetValue
WritePrivateProfileStructW
GetLocaleInfoW
EnumDateFormatsExW
WriteFileEx
SetCurrentDirectoryW
ExitProcess
LoadLibraryA
GetPrivateProfileStructW
FreeLibraryAndExitThread
GetStartupInfoA
WideCharToMultiByte
GetCurrentThreadId
GetCPInfo
GetModuleFileNameA
GetModuleFileNameW
GetCommandLineA
TlsFree
CompareStringA
GetPrivateProfileSectionW
GetLocalTime
CreateFileW
VirtualQuery
EnumCalendarInfoA
OpenMutexA
GetProcessHeaps
FoldStringA
WaitNamedPipeW
HeapReAlloc
SetConsoleCursorInfo
GetEnvironmentStringsW
CompareStringW
EnterCriticalSection
InterlockedExchange
GetProcessAffinityMask
RemoveDirectoryW
SuspendThread
GetTempPathW
RtlUnwind
MapViewOfFile
LCMapStringW
SetFilePointer
SetEnvironmentVariableA
LoadResource
GetStartupInfoW
GetSystemTime
CommConfigDialogA
LeaveCriticalSection
SetStdHandle
EnumTimeFormatsA
GetLastError
FreeEnvironmentStringsW
FindAtomW
Sections
.text Size: 124KB - Virtual size: 122KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ