Static task
static1
Behavioral task
behavioral1
Sample
ac0f22992c23b78af89b9d5a888b479b753e3ea574e899690eb94fbd7095b9ac.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ac0f22992c23b78af89b9d5a888b479b753e3ea574e899690eb94fbd7095b9ac.exe
Resource
win10v2004-20221111-en
General
-
Target
ac0f22992c23b78af89b9d5a888b479b753e3ea574e899690eb94fbd7095b9ac
-
Size
463KB
-
MD5
ffb58052018bc109875aba4c5cae329a
-
SHA1
ad12b53f80f7e9aa7516a8dace83070f8ac316cd
-
SHA256
ac0f22992c23b78af89b9d5a888b479b753e3ea574e899690eb94fbd7095b9ac
-
SHA512
bf620ff4548b86d0a3a3252fbfa4ac58948983ad9bd5df4703f094b0f9a9f49b8087b2ecdc622093ea5786b563abba8f6d1a085fd902349ffcc110ac7f43199d
-
SSDEEP
6144:q97fg7qaofHL3b3/woBsfaiM4e+aDkoD802Y802g802Y802W:q9sOhfHXIM4HaDkI802Y802g802Y802
Malware Config
Signatures
Files
-
ac0f22992c23b78af89b9d5a888b479b753e3ea574e899690eb94fbd7095b9ac.exe windows x86
f977949704e12c835586c3b02badaf18
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SizeofResource
CreateDirectoryA
CreateFileA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
CloseHandle
MultiByteToWideChar
GetLastError
GetModuleFileNameA
SetLastError
CreateEventA
FindFirstFileA
CopyFileA
Sleep
WinExec
FindNextFileA
FindClose
GetLogicalDriveStringsA
ExpandEnvironmentStringsA
LockResource
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
IsValidCodePage
LoadResource
GetDriveTypeA
FindResourceA
GetOEMCP
GetACP
HeapSize
SetFilePointer
ReadFile
FlushFileBuffers
GetConsoleMode
GetConsoleCP
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
GetProcAddress
ExitProcess
GetCommandLineA
GetStartupInfoA
RaiseException
HeapFree
RtlUnwind
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetCPInfo
HeapAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
WriteFile
GetStdHandle
LoadLibraryA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetProcessHeap
user32
DispatchMessageA
GetMessageA
LoadStringA
EndDialog
PostQuitMessage
EndPaint
BeginPaint
DefWindowProcA
DestroyWindow
DialogBoxParamA
UpdateWindow
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
TranslateAcceleratorA
LoadAcceleratorsA
TranslateMessage
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
shell32
SHGetPathFromIDListA
SHGetSpecialFolderPathA
SHGetSpecialFolderLocation
ole32
CoInitialize
CoUninitialize
CoCreateInstance
Sections
.text Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 335KB - Virtual size: 334KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE