Static task
static1
Behavioral task
behavioral1
Sample
a04fc6b08a0e0ce19c761f400e372de77435a491416c55bfa9abcf7b6adb51e3.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a04fc6b08a0e0ce19c761f400e372de77435a491416c55bfa9abcf7b6adb51e3.exe
Resource
win10v2004-20221111-en
General
-
Target
a04fc6b08a0e0ce19c761f400e372de77435a491416c55bfa9abcf7b6adb51e3
-
Size
268KB
-
MD5
8caf18e57098e87d1fbf7c408fd5ab5f
-
SHA1
8649905f4a3ea9cb843b20b80b4b26d5a1851e6f
-
SHA256
a04fc6b08a0e0ce19c761f400e372de77435a491416c55bfa9abcf7b6adb51e3
-
SHA512
a0eba9a639aed4029b4bc2d23681bbf32d14e93cefaf4ee5081f6b44af71b16b19e1f8fcfe135b3afb62d69b8d26f1dfe28ed6fac5479517a75e47a52fe905e3
-
SSDEEP
6144:IQwhv/+xycU3gcMVbZ1IKohhvwnLMTq9i:BY/+xyJ3gcMVnXloTq9i
Malware Config
Signatures
Files
-
a04fc6b08a0e0ce19c761f400e372de77435a491416c55bfa9abcf7b6adb51e3.exe windows x86
d4495d09f35e79e4414a6c60a306ad4a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DefFrameProcW
GetWindowPlacement
GetAltTabInfoA
GetOpenClipboardWindow
GetMenu
PostQuitMessage
CharPrevW
GetMessageTime
GetCaretBlinkTime
GetCursorPos
LoadImageW
SetDlgItemTextA
GetParent
WinHelpA
SetClassLongA
GetMessageA
RemoveMenu
GetDC
GetWindowThreadProcessId
GetMessageExtraInfo
IsWinEventHookInstalled
CountClipboardFormats
IsWindowUnicode
GetSystemMetrics
GetScrollBarInfo
CreateCaret
ChangeClipboardChain
GetMenuItemRect
CopyImage
GetDlgCtrlID
CheckMenuItem
TrackPopupMenu
DrawIcon
GetClipboardFormatNameW
GetClipCursor
InSendMessage
GetTitleBarInfo
IsWindowVisible
GetMenuCheckMarkDimensions
GetProcessDefaultLayout
ScrollWindowEx
BeginDeferWindowPos
CreateIconFromResource
MapVirtualKeyW
EndDeferWindowPos
WindowFromDC
OpenClipboard
GetClipboardViewer
GetGuiResources
RealChildWindowFromPoint
IsClipboardFormatAvailable
IsIconic
TrackMouseEvent
IsMenu
OemKeyScan
ChildWindowFromPointEx
GetMenuItemID
DrawIconEx
KillTimer
IsCharAlphaNumericA
GetLayeredWindowAttributes
IsCharAlphaNumericW
IsDlgButtonChecked
IsWindow
comdlg32
CommDlgExtendedError
shell32
DragAcceptFiles
SHGetFileInfoA
SHBrowseForFolderA
ole32
OleCreateMenuDescriptor
advapi32
RegSetValueExW
gdi32
CreateFontIndirectW
CreateRectRgn
GetClipBox
CreatePatternBrush
RectVisible
winspool.drv
ClosePrinter
kernel32
GetLocaleInfoA
RtlUnwind
HeapReAlloc
VirtualAlloc
InitializeCriticalSectionAndSpinCount
LoadLibraryA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
HeapFree
VirtualFree
HeapCreate
DeleteCriticalSection
GetFileType
SetHandleCount
GetStringTypeA
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
WriteFile
ExitProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
GetProcAddress
GetModuleHandleW
GetStartupInfoA
GetCommandLineA
MultiByteToWideChar
UnmapViewOfFile
GetStringTypeW
LCMapStringA
GetTimeFormatA
TerminateThread
CreateFileMappingA
FindFirstFileW
GetSystemDirectoryA
LCMapStringW
HeapSize
GetEnvironmentStringsW
PeekNamedPipe
SetPriorityClass
GetTempPathA
LockResource
EscapeCommFunction
WTSGetActiveConsoleSessionId
GetFileInformationByHandle
PulseEvent
GetThreadIOPendingFlag
ReplaceFileW
TlsGetValue
IsWow64Process
GetProcessId
InitAtomTable
TransmitCommChar
EncodePointer
ReleaseMutex
PrepareTape
CancelWaitableTimer
GetWriteWatch
GetCurrentProcess
GetVersion
GetStdHandle
GetCurrentThread
SetHandleInformation
HeapAlloc
GetCommModemStatus
SetMessageWaitingIndicator
SetStdHandle
GetCurrentProcessId
GetProcessHeap
FlushFileBuffers
GetNamedPipeInfo
MapUserPhysicalPagesScatter
GetMailslotInfo
GetTapeStatus
DecodeSystemPointer
RemoveDirectoryW
LockFileEx
Sleep
GetLastError
SuspendThread
GetFullPathNameW
SetEvent
GetTempFileNameW
GetModuleFileNameW
GetCommandLineW
VirtualProtect
Sections
.text Size: 215KB - Virtual size: 215KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ