Static task
static1
Behavioral task
behavioral1
Sample
acf87fca082e20f36c25b5d94122b84e668c9abf9d79fa5b1e0a4175be23bca3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
acf87fca082e20f36c25b5d94122b84e668c9abf9d79fa5b1e0a4175be23bca3.exe
Resource
win10v2004-20220901-en
General
-
Target
acf87fca082e20f36c25b5d94122b84e668c9abf9d79fa5b1e0a4175be23bca3
-
Size
1.5MB
-
MD5
268db8e4395ae8b681c2b464929507a4
-
SHA1
58989dedf0d296a538dae882010b83b3d69b4eef
-
SHA256
acf87fca082e20f36c25b5d94122b84e668c9abf9d79fa5b1e0a4175be23bca3
-
SHA512
5fee12270e60ee0482fb5510f7189bf5525290bd9cd1f83fc4facfd77b89c87229837f1676a779038ae92ba9895e4db549d1c1f88e9b08eefbac7ba232514038
-
SSDEEP
12288:i+hJujh6VJ2iaO7c/FpapvS7OPeUefc8Ed+HV1217vzry:P+jUVJaOGiJeBfqd+HD217bry
Malware Config
Signatures
Files
-
acf87fca082e20f36c25b5d94122b84e668c9abf9d79fa5b1e0a4175be23bca3.exe windows x86
2396faae483e5f340355bcc4d8a24a68
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileSectionNamesA
GetCurrentThread
DeviceIoControl
OpenSemaphoreW
FindResourceExA
SetFileAttributesW
CreateTapePartition
OpenJobObjectW
DuplicateHandle
MapViewOfFile
Toolhelp32ReadProcessMemory
IsValidCodePage
GetPrivateProfileStructA
OpenJobObjectA
FindFirstVolumeMountPointA
VerifyVersionInfoW
FindResourceExW
SetErrorMode
FormatMessageA
GetCompressedFileSizeA
VirtualAlloc
AssignProcessToJobObject
OpenEventW
GetVolumePathNameA
GetPrivateProfileSectionA
SetHandleInformation
FreeUserPhysicalPages
SearchPathA
GetVolumeInformationA
SetConsoleDisplayMode
GetThreadLocale
ReadDirectoryChangesW
GetConsoleAliasExesLengthW
CreateMailslotA
GetProfileIntW
IsSystemResumeAutomatic
SetEvent
SetStdHandle
SetCurrentDirectoryA
FindFirstVolumeW
ReleaseMutex
OpenProcess
GetFileAttributesExA
GetStringTypeExW
FreeEnvironmentStringsW
DefineDosDeviceW
GetUserDefaultLCID
GetPrivateProfileSectionNamesW
GetLogicalDriveStringsA
GetTempPathW
CreateDirectoryA
OpenThread
GetShortPathNameW
GetFileSize
SetTapeParameters
GetFileSizeEx
DosDateTimeToFileTime
SetThreadLocale
MapUserPhysicalPages
FindResourceA
SwitchToThread
GetDiskFreeSpaceA
GetConsoleAliasesW
user32
LoadCursorA
DestroyMenu
RemoveMenu
GetFocus
GetScrollInfo
SetWindowTextA
GetMenuItemInfoW
FrameRect
GetDC
MessageBoxA
DestroyIcon
GetClassNameW
ChildWindowFromPointEx
GetProcessWindowStation
EndDialog
GetWindow
GetWindowInfo
DrawIcon
GetAsyncKeyState
GetDlgItemInt
CheckDlgButton
MapWindowPoints
SetActiveWindow
SetWindowsHookExW
SetWindowTextW
EnumThreadWindows
DestroyWindow
InvalidateRect
OpenWindowStationW
GetForegroundWindow
GetClassInfoExW
LoadMenuA
CharNextA
SetRect
SetFocus
SetCursor
GetDlgItemTextW
DispatchMessageA
CloseDesktop
PeekMessageA
SendDlgItemMessageW
RedrawWindow
InsertMenuItemW
GetAltTabInfoA
SystemParametersInfoA
ole32
CoSetProxyBlanket
STGMEDIUM_UserMarshal
HGLOBAL_UserFree
HMENU_UserUnmarshal
OleGetIconOfFile
StgSetTimes
PropVariantClear
PropVariantCopy
OleCreateFromFile
CoFreeAllLibraries
IsAccelerator
CoRegisterPSClsid
ProgIDFromCLSID
CLIPFORMAT_UserMarshal
CLIPFORMAT_UserSize
MkParseDisplayName
OleSaveToStream
HGLOBAL_UserUnmarshal
OleQueryLinkFromData
CoDisableCallCancellation
GetHGlobalFromILockBytes
CreateBindCtx
HICON_UserMarshal
CoGetTreatAsClass
STGMEDIUM_UserSize
HACCEL_UserUnmarshal
CoGetContextToken
oleaut32
GetErrorInfo
Sections
.text Size: 514KB - Virtual size: 513KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 628KB - Virtual size: 627KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.8jr6z Size: 377KB - Virtual size: 376KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ