Static task
static1
Behavioral task
behavioral1
Sample
a2d5ab438bd3156c7b9bdce4074c97e6244707b4c340961862d0bc8b14c1a177.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a2d5ab438bd3156c7b9bdce4074c97e6244707b4c340961862d0bc8b14c1a177.exe
Resource
win10v2004-20221111-en
General
-
Target
a2d5ab438bd3156c7b9bdce4074c97e6244707b4c340961862d0bc8b14c1a177
-
Size
227KB
-
MD5
31cc5befd2fc3940ff4a4886b1939320
-
SHA1
a355e8ea4ac49a36f679cbf5c46b388c4a5e2792
-
SHA256
a2d5ab438bd3156c7b9bdce4074c97e6244707b4c340961862d0bc8b14c1a177
-
SHA512
4ce8c50487f6058a76e918604a8b4a75062f8f31e3d02e46ed99e6620f09a41a65f37cf93b254051d7869a8d213fd52d4d37c051c0cdfbf910b5a117dd6f5ee3
-
SSDEEP
6144:Gj7R4etASHgD9lUQ5lUoLbZN3k96HY+h7W9:6xeS4g/qZN3bQ
Malware Config
Signatures
Files
-
a2d5ab438bd3156c7b9bdce4074c97e6244707b4c340961862d0bc8b14c1a177.exe windows x86
419a3ae0f6890becfe7706e6209c1cd5
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
IsWindowVisible
GetSystemMetrics
OemToCharA
GetWindowThreadProcessId
VkKeyScanW
CharToOemA
FindWindowW
SetWindowsHookExA
GetFocus
CharLowerBuffW
GetKeyboardLayout
CallNextHookEx
WaitForInputIdle
CharLowerBuffA
GetWindowTextA
AttachThreadInput
SetKeyboardState
GetKeyboardState
CharUpperBuffW
SendMessageA
VkKeyScanA
GetWindow
FindWindowA
keybd_event
GetAsyncKeyState
MessageBeep
CharUpperBuffA
SetForegroundWindow
SetFocus
GetForegroundWindow
SetWindowsHookExW
LoadStringA
IsWindowEnabled
UnhookWindowsHookEx
kernel32
GetEnvironmentStringsA
GetStringTypeW
InterlockedDecrement
GetModuleFileNameA
SetCurrentDirectoryA
FreeEnvironmentStringsA
GetStringTypeA
VirtualQuery
WriteFile
GetCurrentProcess
MultiByteToWideChar
TlsGetValue
GlobalFree
GetFileType
GetTickCount
HeapSize
RaiseException
GetModuleFileNameW
SetHandleCount
ReadFile
GetFullPathNameA
SetEnvironmentVariableA
CompareStringW
LoadLibraryW
DeleteCriticalSection
IsValidCodePage
GlobalLock
FindFirstFileA
lstrcmpiA
FormatMessageW
GetFileTime
RtlUnwind
SetFileTime
GetUserDefaultLangID
CompareStringA
HeapReAlloc
DeleteFileA
FlushFileBuffers
IsDBCSLeadByte
FindClose
GetVersion
GlobalAlloc
TlsSetValue
SetErrorMode
LCMapStringA
GetLocalTime
RemoveDirectoryA
GetLocaleInfoA
GetDriveTypeA
FreeLibrary
GetFileAttributesA
SetEndOfFile
TlsAlloc
GetStartupInfoA
FreeEnvironmentStringsW
GetLocaleInfoW
SetFilePointer
CloseHandle
SetFileAttributesA
SetStdHandle
InterlockedIncrement
HeapAlloc
GetTimeZoneInformation
HeapCreate
LCMapStringW
LockFile
GetVolumeInformationA
FileTimeToSystemTime
FindNextFileA
HeapFree
CreateDirectoryA
UnlockFile
HeapDestroy
GetCPInfo
GetCurrentDirectoryA
CreateFileA
GetLastError
GetUserDefaultLCID
GetCommandLineA
SetLastError
SetLocalTime
FileTimeToLocalFileTime
VirtualFree
GetComputerNameA
GlobalUnlock
IsBadReadPtr
GetEnvironmentStrings
LeaveCriticalSection
WideCharToMultiByte
GetStdHandle
advapi32
RegSetValueExW
RegQueryValueExW
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyW
RegSetValueExA
RegQueryInfoKeyA
RegOpenKeyW
RegDeleteValueW
RegDeleteValueA
OpenProcessToken
RegDeleteKeyA
RegCreateKeyA
RegDeleteKeyW
RegEnumKeyW
RegQueryValueExA
RegEnumValueW
RegEnumValueA
RegOpenKeyA
RegEnumKeyA
RegCloseKey
ole32
CoGetClassObject
CoDisconnectObject
BindMoniker
CoGetMalloc
MkParseDisplayName
CoCreateInstance
CreateBindCtx
Sections
.text Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ