Static task
static1
Behavioral task
behavioral1
Sample
ac0f47391a3fc4481d1ddeefcdb5e54b43e6b963c5c73dae8dd29887b47f180e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ac0f47391a3fc4481d1ddeefcdb5e54b43e6b963c5c73dae8dd29887b47f180e.exe
Resource
win10v2004-20221111-en
General
-
Target
ac0f47391a3fc4481d1ddeefcdb5e54b43e6b963c5c73dae8dd29887b47f180e
-
Size
240KB
-
MD5
6d6e6a3b4dec71ff268e5db800d5bcf5
-
SHA1
61c6eab37adfe8231a5ee19b9923be87b00bac13
-
SHA256
ac0f47391a3fc4481d1ddeefcdb5e54b43e6b963c5c73dae8dd29887b47f180e
-
SHA512
b5688457b9625f2ec0d82494fa492d98461afdeefe4b5f0336bc2c2470f90e0e952faf9a7784177dc0623beab5e0549f0c39a2a248291c7dad63c0b51ff21d14
-
SSDEEP
6144:qn/L+2uabXMfTOi16wtYSjcJvcw51NhL9emV9jtpzkkxmh3Z:U1uabXMfTz9tMJX51Nhd7jwUa3Z
Malware Config
Signatures
-
NSIS installer 2 IoCs
Processes:
resource yara_rule sample nsis_installer_1 sample nsis_installer_2
Files
-
ac0f47391a3fc4481d1ddeefcdb5e54b43e6b963c5c73dae8dd29887b47f180e.exe windows x86
e3e1ba523cf61b826993834dca364e87
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFullPathNameA
MoveFileA
SearchPathA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
GetShortPathNameA
SetCurrentDirectoryA
Sleep
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
SetEnvironmentVariableA
GetWindowsDirectoryA
GetTempPathA
GetModuleHandleA
GetTickCount
CloseHandle
lstrlenA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
ReadFile
lstrcpyA
lstrcatA
GetSystemDirectoryA
GetVersion
GetProcAddress
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
CompareFileTime
SetFileTime
ExpandEnvironmentStringsA
lstrcmpiA
lstrcmpA
SetErrorMode
GlobalFree
LoadLibraryA
GetCommandLineA
MulDiv
DeleteFileA
FindFirstFileA
FindNextFileA
FindClose
SetFilePointer
WriteFile
GetPrivateProfileStringA
WritePrivateProfileStringA
MultiByteToWideChar
LoadLibraryExA
FreeLibrary
user32
EndDialog
ScreenToClient
GetWindowRect
RegisterClassA
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetAsyncKeyState
IsDlgButtonChecked
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
CreateWindowExA
SystemParametersInfoA
GetDlgItem
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
wvsprintfA
DispatchMessageA
PeekMessageA
LoadImageA
GetDC
ReleaseDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
GetClassInfoA
DialogBoxParamA
CharNextA
ExitWindowsEx
DestroyWindow
CreateDialogParamA
SetWindowTextA
PostQuitMessage
SetForegroundWindow
ShowWindow
SetWindowLongA
SendMessageTimeoutA
FindWindowExA
IsWindow
EmptyClipboard
SetClipboardData
OpenClipboard
FillRect
DrawTextA
EndPaint
wsprintfA
SetTimer
gdi32
SelectObject
SetBkMode
CreateFontIndirectA
SetTextColor
DeleteObject
GetDeviceCaps
CreateBrushIndirect
SetBkColor
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
advapi32
RegCloseKey
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumValueA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegEnumKeyA
comctl32
ImageList_Create
ord17
ImageList_Destroy
ImageList_AddMasked
ole32
CoCreateInstance
CoTaskMemFree
OleInitialize
OleUninitialize
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: - Virtual size: 56KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ