Static task
static1
Behavioral task
behavioral1
Sample
ac7c350da2a126bcc37c76078fad332f96daaf29c3c8ee5b0b17c08894429af2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ac7c350da2a126bcc37c76078fad332f96daaf29c3c8ee5b0b17c08894429af2.exe
Resource
win10v2004-20220812-en
General
-
Target
ac7c350da2a126bcc37c76078fad332f96daaf29c3c8ee5b0b17c08894429af2
-
Size
146KB
-
MD5
3185141ae55791c39d3742d046be5ae3
-
SHA1
26d6ef484fb3af32b5751f5110b7c635fd76bb30
-
SHA256
ac7c350da2a126bcc37c76078fad332f96daaf29c3c8ee5b0b17c08894429af2
-
SHA512
38c87ddd31eda4a6bf9cc48f4f7c9971ce2be0466d05b9742a3b26ec672e2d737c945bbf8cdd8f5bf37b0e54d07480e368aced19ce2981c3e51183136910d0c9
-
SSDEEP
3072:x4wPF/mD/7iRSkEo50Ii+mWbMrQhXTebbMv:ZPFuD/7/kKLrEjQov
Malware Config
Signatures
Files
-
ac7c350da2a126bcc37c76078fad332f96daaf29c3c8ee5b0b17c08894429af2.exe windows x86
583a1ee19e135d9b847809b337f8b4c1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHBrowseForFolderA
ShellExecuteA
SHGetPathFromIDListA
kernel32
FreeLibrary
GetCurrentProcessId
GetModuleFileNameW
GetTempPathW
CreateDirectoryW
lstrlenW
lstrcmpiW
GetCurrentThreadId
SetCurrentDirectoryW
WideCharToMultiByte
ReadFile
GetSystemDirectoryW
GlobalAlloc
GetCommandLineW
CreateJobObjectA
InterlockedExchange
CreateMutexW
LocalReAlloc
WaitNamedPipeW
GetProcessHeap
GetLogicalDriveStringsW
WriteFile
HeapAlloc
FormatMessageW
GetProcAddress
DeleteFileW
MultiByteToWideChar
ReleaseMutex
LocalAlloc
GetSystemTimeAsFileTime
GetPrivateProfileStringW
InterlockedIncrement
BackupRead
SetLastError
GetPrivateProfileIntW
HeapFree
GetDateFormatA
SetFilePointer
RaiseException
OpenEventW
GetThreadLocale
GetPrivateProfileSectionW
GetFileSize
lstrlenA
CreateFileA
GetFullPathNameW
DeviceIoControl
GetTickCount
GetFileAttributesW
GetWindowsDirectoryW
GlobalAddAtomW
CopyFileW
GetStartupInfoA
SetThreadPriority
ExpandEnvironmentStringsW
GetTempPathA
GetCurrentProcess
GetModuleHandleA
CloseHandle
GetVolumeInformationW
SwitchToThread
lstrcmpW
LocalFree
InterlockedDecrement
GetFileTime
LocalLock
IsBadCodePtr
CreateFileW
OpenSemaphoreA
GetExitCodeProcess
IsWow64Process
RemoveDirectoryA
GlobalWire
QueryPerformanceCounter
IsValidLocale
GetDateFormatW
GetTimeFormatW
GlobalFree
GetProcessVersion
shlwapi
StrCmpLogicalW
PathIsRelativeW
PathIsNetworkPathA
comctl32
PropertySheetA
oleaut32
VariantCopyInd
SysStringLen
SysAllocStringLen
VariantClear
user32
GetWindowInfo
IsRectEmpty
GetWindowDC
SetFocus
Sections
.text Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.clyu Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 132KB - Virtual size: 247KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ