Static task
static1
Behavioral task
behavioral1
Sample
af399e869eb0d217cef5978393210491edfe0460f068179f1fad7d760967cd0e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
af399e869eb0d217cef5978393210491edfe0460f068179f1fad7d760967cd0e.exe
Resource
win10v2004-20220812-en
General
-
Target
af399e869eb0d217cef5978393210491edfe0460f068179f1fad7d760967cd0e
-
Size
389KB
-
MD5
acc2ca2f1ecd2050cb4ff855533be0ee
-
SHA1
1b7fc5726c892c40d33ee5717ba1b0736076b8b2
-
SHA256
af399e869eb0d217cef5978393210491edfe0460f068179f1fad7d760967cd0e
-
SHA512
47ea0c3ff994e04cca6309829df26575df0d45d8acf7b82a44bfce31c24d3a0490ec1aef0dc42dd7ec98b07da10ae0b3891df174cc04120063d45cdcd048d09e
-
SSDEEP
12288:nQV1ucgOU8Q0XnPXCb+o8mrhNn6XP/gfjj:nJcgX8QynPXCb8Qfj
Malware Config
Signatures
Files
-
af399e869eb0d217cef5978393210491edfe0460f068179f1fad7d760967cd0e.exe windows x86
7a5567ef6052e3d85f075eecc97a36da
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetThreadDesktop
GetSubMenu
GetFocus
ChangeMenuW
DefWindowProcW
AdjustWindowRect
ShowWindow
SwitchDesktop
OpenClipboard
OpenIcon
wvsprintfA
SendMessageA
DestroyIcon
DrawAnimatedRects
DispatchMessageW
IsCharAlphaNumericW
CheckRadioButton
UnpackDDElParam
SetWindowTextW
InvalidateRect
SwitchToThisWindow
SetPropA
MenuItemFromPoint
RegisterClassA
GrayStringW
ToAscii
RegisterClassExA
SetMenu
VkKeyScanA
ScrollWindowEx
VkKeyScanExA
CreateWindowExA
MessageBoxW
SendInput
SetUserObjectInformationA
EndTask
RedrawWindow
ChangeDisplaySettingsExA
CreateDesktopA
GetWindowModuleFileNameW
GetAltTabInfo
GetClassInfoExW
GetKeyNameTextA
GetMonitorInfoW
SetDoubleClickTime
RegisterWindowMessageA
EnumWindows
CreateDesktopW
EndDialog
CheckDlgButton
WindowFromPoint
CharUpperA
DestroyWindow
DdeFreeStringHandle
comctl32
CreatePropertySheetPageW
CreateStatusWindowA
ImageList_Copy
ImageList_Draw
ImageList_BeginDrag
ImageList_DrawEx
ImageList_DragMove
CreateMappedBitmap
ImageList_Add
InitCommonControlsEx
ImageList_EndDrag
ImageList_Remove
ImageList_GetIcon
CreateUpDownControl
ImageList_Replace
ImageList_DragEnter
ImageList_AddIcon
ImageList_GetImageRect
ImageList_SetDragCursorImage
ImageList_Destroy
CreateStatusWindowW
ImageList_LoadImage
kernel32
VirtualLock
VirtualFree
GetTimeFormatA
WideCharToMultiByte
GetProfileSectionA
SetStdHandle
SetFileAttributesW
LeaveCriticalSection
SetLocaleInfoA
IsValidLocale
WritePrivateProfileSectionA
EnumDateFormatsExA
CreateDirectoryA
GetProcAddress
GetThreadContext
InitializeCriticalSection
RtlUnwind
HeapAlloc
FreeEnvironmentStringsA
GetACP
EnumSystemLocalesA
SetVolumeLabelA
TlsGetValue
SetTimeZoneInformation
GetTickCount
LocalReAlloc
TerminateProcess
GetProfileIntW
GetLocaleInfoW
WriteProfileStringW
CreateProcessW
GetShortPathNameA
IsBadWritePtr
HeapFree
GetModuleFileNameA
RtlZeroMemory
EnumCalendarInfoA
MoveFileA
DebugActiveProcess
DeleteCriticalSection
LocalLock
OpenMutexA
lstrcat
VirtualUnlock
GetConsoleTitleW
GetFileType
LocalFlags
CopyFileA
WriteConsoleW
SetLastError
GetTimeZoneInformation
GetEnvironmentStrings
FreeEnvironmentStringsW
WaitForMultipleObjectsEx
GetUserDefaultLCID
EnterCriticalSection
FindNextFileA
VirtualAlloc
TransmitCommChar
TlsAlloc
VirtualQuery
GetStartupInfoA
LCMapStringW
HeapCreate
GetThreadPriorityBoost
SetEnvironmentVariableA
IsValidCodePage
LoadLibraryA
SetHandleCount
ReadFile
HeapDestroy
GetCPInfo
TransactNamedPipe
GlobalAddAtomW
GetVersionExA
WriteFile
SetCurrentDirectoryA
QueryPerformanceCounter
GetFileAttributesExW
SetFilePointer
UnhandledExceptionFilter
GetCurrentProcess
TlsFree
SetLocaleInfoW
GetStringTypeW
SetPriorityClass
GetOEMCP
CompareStringW
Sleep
lstrcpyA
GetModuleHandleA
GetLastError
GetDateFormatA
VirtualProtect
GetSystemTimeAsFileTime
GetFullPathNameW
MultiByteToWideChar
FileTimeToLocalFileTime
GetCurrentDirectoryA
TlsSetValue
GetNamedPipeHandleStateW
GetDiskFreeSpaceExA
CompareStringA
HeapSize
GetStdHandle
ExitProcess
HeapReAlloc
CreateMutexA
GetStringTypeA
CloseHandle
InterlockedExchange
GetEnvironmentStringsW
GetLocaleInfoA
GetCommandLineA
GetSystemInfo
GetCurrentProcessId
GetDiskFreeSpaceW
GetCurrentThread
LCMapStringA
GetCurrentThreadId
FlushFileBuffers
Sections
.text Size: 165KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 73KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 91KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ