Static task
static1
Behavioral task
behavioral1
Sample
adac0ce82db732431d3dbd120b197e30c37f92bd36db6f0be8be3a0bbacf639b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
adac0ce82db732431d3dbd120b197e30c37f92bd36db6f0be8be3a0bbacf639b.exe
Resource
win10v2004-20220812-en
General
-
Target
adac0ce82db732431d3dbd120b197e30c37f92bd36db6f0be8be3a0bbacf639b
-
Size
1.3MB
-
MD5
589e3682f10737bf474d96b887a402f8
-
SHA1
21c3d9090664b14639339a0f6055fb564c8f7ae1
-
SHA256
adac0ce82db732431d3dbd120b197e30c37f92bd36db6f0be8be3a0bbacf639b
-
SHA512
f1b375f516df78c0c132a9654d5dcffd5d078617368f35174574ec4e034c30649af9a1397efda29732ccc22ad4f6fac5318f51e78f239396d65b6c260c28b331
-
SSDEEP
12288:5hE1rx8TTDPo8beGiIq8k/aslgTPaN3H0ESh+81Exsj1C+pYBXj5uC8pxWn1a17c:5hE1ADPo8beE1ExeYBcC4Mn1eLaj
Malware Config
Signatures
Files
-
adac0ce82db732431d3dbd120b197e30c37f92bd36db6f0be8be3a0bbacf639b.exe windows x86
9f0ec67bf8e68782cc6806a0aa61e54d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
claasc
ASCII
clados
DOS
clanet
NetAutoGetNetName
NetAutoGetServer
NetAutoNotify
NetAutoReceive
NetAutoSendAsync
NetAutoSendBroadCast
NetAutoSendSync
NetAutoSetService
NetBan
NetCloseCallBackWindow
NetDebugTrace
NetErrorStr
NetFreeUniqueEvent
NetGetBanned
NetGetRegistry
NetGetTimeZone
NetGetUniqueEvent
NetGet_NetCriticalSection
NetIsBanned
NetMakeHash
NetMakeHMAC
NetMD5
NetOptions
NetOSDesEncrypt
NetPing
NetSimpleClose
NetSimpleGetServerConnections
NetSimpleOpen
NetSimpleReceive
NetSimpleSend
NetSimpleSSLGetRemoteCerticate
NetSimpleSSLSwitchToSSL
NetUnBan
clarun
Cla$ACCEPTED
Cla$ADDqueue
Cla$ADDqueuekey
Cla$ADDqueueptr
Cla$AssignLong2RefUfo
Cla$AssignReal2RefUfo
Cla$AssignRefUfo
Cla$BEEP
Cla$BindG
Cla$BLOB_GET_PROPERTY
Cla$BLOB_SET_PROPERTY
Cla$BLOB_TAKE
Cla$BLOB_YIELD
Cla$CHOICE
Cla$CLEAR
Cla$CLEARqueue
Cla$clearstr
Cla$ClearUfo
Cla$CLOCK
Cla$CloneUfo
Cla$CLOSEwindow
Cla$code
Cla$COMMAND
Cla$COMMIT
Cla$comparestr
Cla$CONVERTANSITOOEM
Cla$CONVERTOEMTOANSI
Cla$CopyFile
Cla$crc32
Cla$DATE
Cla$DAY
Cla$DecAdd
Cla$DecDistinct
Cla$DecDistinctR
Cla$DecDivide
Cla$DecDivideR
Cla$DecMul
Cla$DecSub
Cla$DecSubR
Cla$DeepAssign
Cla$DELETEqueue
Cla$DELETEREG
Cla$DInt
Cla$DISABLE
Cla$DISPLAY
Cla$DISPOSEqueue
Cla$DISPOSEref
Cla$DISPOSEvref
Cla$Dlongpower
Cla$DPopDec
Cla$DPopLong
Cla$DPopReal
Cla$DPopUlong
Cla$DPushDec
Cla$DPushLong
Cla$DPushULong
Cla$DStack2Stack
Cla$duplicate
Cla$ENABLE
Cla$EndEventLoop
Cla$ERRORCODE
Cla$ERRORFILE
Cla$Evaluate
Cla$EVENT
Cla$FIELD
Cla$FILEERRORCODE
Cla$FILEERRORMSG
Cla$FileExists
Cla$FILE_ADDf
Cla$FILE_ADDfu
Cla$FILE_BUFFER
Cla$FILE_BUILDf
Cla$FILE_BYTES
CLA$FILE_CALLBACK
Cla$FILE_CLEAR
Cla$FILE_CLOSE
Cla$FILE_CREATE
Cla$FILE_DELETE
CLA$FILE_DESTROY
Cla$FILE_DUPLICATEk
CLA$FILE_FREESTATE
Cla$FILE_GETfk
Cla$FILE_GETfl
Cla$FILE_GETNULLS
CLA$FILE_GETSTATE
Cla$FILE_GET_PROPERTY
Cla$FILE_NAME
Cla$FILE_NEXT
Cla$FILE_NOMEMO
Cla$FILE_OPEN
Cla$FILE_POSITIONf
Cla$FILE_POSITIONk
Cla$FILE_PREV
Cla$FILE_PUTf
Cla$FILE_REGETf
Cla$FILE_REGETk
Cla$FILE_RESETf
Cla$FILE_RESETk
CLA$FILE_RESTORESTATE
Cla$FILE_SEND
Cla$FILE_SETk
Cla$FILE_SETkk
Cla$FILE_SETNULLS
Cla$FILE_SET_PROPERTY
Cla$FILE_WATCH
Cla$FOCUS
Cla$FREEqueue
Cla$FREEqueuea
Cla$freestr
Cla$FreeUfo
Cla$freewindow
Cla$GETGROUP
Cla$GETGROUPqueue
Cla$GETINI
Cla$GetPropS
Cla$GETqueuekey
Cla$GETqueueptr
Cla$GETREG
Cla$Group2Ufo
Cla$HALT
Cla$i64FromDecU
Cla$init
Cla$INSTANCE
Cla$INT
Cla$IsAlpha
Cla$isftoupper
Cla$ISGROUP
Cla$ISGROUPqueue
Cla$IsUfoString
Cla$KEYCODE
Cla$KEY_GET_PROPERTY
Cla$LFNDIRECTORY
Cla$loaddec
Cla$LOGOUT
Cla$LONGPATH
Cla$longtostr
Cla$Mem2Ufo
Cla$MessageBox
Cla$modulus
Cla$MONTH
Cla$NewMemB
Cla$NewMemT
Cla$NewMemZ
Cla$NEWqueue
Cla$NOTIFICATION
Cla$OPENowned
Cla$OPENwindow
Cla$PEEK
Cla$POINTERqueue
Cla$PopAString
Cla$PopBind
Cla$PopCString
Cla$PopPString
Cla$PopReal
Cla$PopString
Cla$PopTemp
Cla$POST
Cla$PushAString
Cla$PushBind
Cla$PushCString
Cla$PushLong
Cla$PushPictDec
Cla$PushPictLong
Cla$PushReal
Cla$PushString
Cla$PushTemp
Cla$PushUfo
Cla$PUTINI
Cla$PUTqueue
Cla$PUTqueuekey
Cla$PUTqueueskey
Cla$PUTREG
Cla$pwopen
Cla$RANDOM
Cla$realdistinct
Cla$RECORDSqueue
Cla$RefAssignAny
Cla$REGULAR
Cla$RemoveFile
Cla$RESUME
Cla$ROLLBACK
Cla$rterr
Cla$RUN
Cla$SELECT
Cla$SETCURSOR
Cla$SETKEYCODE
Cla$SetPropS
Cla$SetPropV
Cla$SORTqueuefkey
Cla$SORTqueuekey
Cla$Stack2DStack
Cla$Stack2Ufo
Cla$StackALL
Cla$StackCLIP
Cla$StackCompare
Cla$StackCompareN
Cla$StackCompareNEQ
Cla$StackCompareR
Cla$StackConcat
Cla$StackConcatR
Cla$StackDEFORMAT2
Cla$StackErrstr
Cla$StackFORMAT2
Cla$StackHeap
Cla$StackINSTRING
Cla$StackLEFT
Cla$StackLen
Cla$StackLOWER
Cla$StackNUMERIC
Cla$STACKpop
Cla$StackRIGHT
Cla$StackRotate
Cla$StackSUB
Cla$StackUPPER
Cla$StackVAL
Cla$START1
Cla$StartEventLoop
Cla$STATUSfile
Cla$STOP
Cla$storecstr
Cla$storedec
Cla$storestr
Cla$String2Ref
Cla$THREAD
Cla$THREAD_FILE
Cla$TODAY
Cla$Ufo2Real
Cla$Ufodistinct
Cla$UNHIDE
Cla$UNREGISTEREVENT
Cla$VIEW_RESETvf
Cla$VIEW_SETvl
Cla$WHAT
Cla$WHATqueue
Cla$WHO
Cla$WHOqueue
Cla$YEAR
Cla$YIELD
NewCriticalSection
THR$GetInstance
VIEWDRIVER
_exit
_free
_malloc
_memchr
_memcmp
_memcpy
_mkdir
_srand
__sysinit
__sysstart
clatps
TOPSPEED
kernel32
CloseHandle
CreateFileA
FileTimeToSystemTime
FlushFileBuffers
FormatMessageA
GetCurrentProcessId
GetFileSize
GetFileTime
GetLastError
GetProcAddress
GetSystemTime
LoadLibraryA
MultiByteToWideChar
OutputDebugStringA
ReadFile
SetFilePointer
WideCharToMultiByte
WriteFile
user32
GetSysColor
Sections
.text Size: 987KB - Virtual size: 987KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 194KB - Virtual size: 203KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cwtls Size: 1024B - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ