Static task
static1
Behavioral task
behavioral1
Sample
a9cc5998c8f6a1a196d01eb7305e51d22b3a81b3b55d7e75fa5c9d64dd795d2c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a9cc5998c8f6a1a196d01eb7305e51d22b3a81b3b55d7e75fa5c9d64dd795d2c.exe
Resource
win10v2004-20220812-en
General
-
Target
a9cc5998c8f6a1a196d01eb7305e51d22b3a81b3b55d7e75fa5c9d64dd795d2c
-
Size
356KB
-
MD5
38af0f5e86bc1533119612eb37ac1c75
-
SHA1
09561c2b2ab9d8f001cad93192bab4c25ccef7a3
-
SHA256
a9cc5998c8f6a1a196d01eb7305e51d22b3a81b3b55d7e75fa5c9d64dd795d2c
-
SHA512
e7ae4bf4439440f50f9613c6c541c555251907a2bf7fccfe131c58de4158af00b026464c7e54013fba7c4e622703e8f5b31d072da4d4f67a9615370c7c618e71
-
SSDEEP
6144:0fRFfCymeCSX8pIJMsWKSLabTIDYrmj2s2gBjANKqnYD3z1zhwT:e76+8t3KSLabTIEE3cErJlwT
Malware Config
Signatures
Files
-
a9cc5998c8f6a1a196d01eb7305e51d22b3a81b3b55d7e75fa5c9d64dd795d2c.exe windows x86
9565fa9754cc83cc90c4c49dbdf93442
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegEnumKeyExA
IsValidSid
AdjustTokenPrivileges
OpenThreadToken
OpenProcessToken
RegOpenKeyExA
RegQueryValueExA
LookupPrivilegeValueW
kernel32
GetProcessAffinityMask
SetFilePointer
OpenProcess
MultiByteToWideChar
GetThreadTimes
GetModuleHandleA
GetPriorityClass
lstrcmpW
SetEvent
CreateEventW
GetComputerNameW
FindResourceA
Sleep
GetUserDefaultLangID
GlobalAlloc
FreeLibrary
CreateSemaphoreW
GetWindowsDirectoryW
lstrlenA
SetProcessAffinityMask
SetCurrentDirectoryA
LoadLibraryA
QueryPerformanceCounter
GetSystemTimeAsFileTime
WideCharToMultiByte
GetCurrentDirectoryW
SetUnhandledExceptionFilter
lstrcmpiW
GetModuleFileNameA
VirtualAlloc
IsDebuggerPresent
GetTickCount
HeapSize
GetProcAddress
FindAtomA
InterlockedDecrement
GetNumberFormatW
GetLogicalDrives
HeapReAlloc
lstrlenW
GetCurrentProcess
GetSystemDefaultLangID
SetPriorityClass
HeapDestroy
GetCommandLineW
WriteFile
GetStartupInfoW
GetModuleHandleW
ExitProcess
CreateMutexW
GetComputerNameExW
GetCurrentProcessId
GetVersion
PulseEvent
ProcessIdToSessionId
ReleaseMutex
OpenSemaphoreA
EnterCriticalSection
FindResourceExA
GetSystemDefaultLCID
GetThreadLocale
SetProcessShutdownParameters
GetStartupInfoA
GlobalMemoryStatusEx
GetCurrentDirectoryA
FreeEnvironmentStringsA
WaitForSingleObject
ExpandEnvironmentStringsW
TlsAlloc
CreateProcessW
GetAtomNameA
GetCurrentThreadId
FormatMessageW
FindResourceExW
lstrcatW
GetVersionExW
GetLocaleInfoW
LocalAlloc
AreFileApisANSI
GetConsoleOutputCP
LocalFree
GlobalFree
CreateEventA
GetUserDefaultLCID
GetACP
HeapFree
HeapAlloc
ResetEvent
GetProcessHeap
CreateThread
OpenSemaphoreW
CloseHandle
CreateFileA
lstrcpynW
lstrcpyW
GetLastError
GetOEMCP
LoadLibraryW
SetFileAttributesA
InterlockedCompareExchange
GetVersionExA
OpenEventW
IsBadWritePtr
FindClose
SetLastError
GetCurrentThread
DelayLoadFailureHook
DeleteCriticalSection
UnhandledExceptionFilter
gdi32
CreateFontIndirectW
GetCharWidth32W
CreateBrushIndirect
CreateCompatibleBitmap
Rectangle
SetBkMode
SetTextColor
CreateCompatibleDC
DeleteDC
GetCurrentObject
GetObjectW
BitBlt
SelectObject
MoveToEx
LineTo
CreatePen
ExtCreatePen
SetPixel
GetStockObject
CreateRectRgn
DeleteObject
CreateSolidBrush
CombineRgn
SetRectRgn
GetDeviceCaps
FillRgn
user32
DestroyIcon
LoadImageW
CountClipboardFormats
BeginDeferWindowPos
FindWindowExA
GetMenuItemCount
EnableMenuItem
GetSystemMetrics
SetMenuItemInfoW
LoadMenuW
DestroyMenu
ExitWindowsEx
GetActiveWindow
LockWorkStation
GetAsyncKeyState
GetMessageA
SetForegroundWindow
OpenIcon
LoadAcceleratorsW
MessageBoxW
CheckDlgButton
EndDialog
GetWindowTextW
IsDlgButtonChecked
GetSubMenu
RegisterClassExA
InvalidateRect
GetSysColor
MonitorFromRect
SetTimer
LoadIconW
GetThreadDesktop
GetDialogBaseUnits
GetCapture
KillTimer
DispatchMessageA
GetDesktopWindow
DestroyWindow
MessageBeep
MoveWindow
PostQuitMessage
IsZoomed
SendMessageA
DispatchMessageW
TranslateMessage
IsDialogMessageW
TranslateAcceleratorW
GetMessageW
CreateDialogParamW
SendMessageTimeoutW
AllowSetForegroundWindow
GetWindowThreadProcessId
FindWindowW
RegisterWindowMessageW
FillRect
DrawTextW
UpdateWindow
GetDlgCtrlID
SetFocus
CreateWindowExW
DialogBoxParamW
GetShellWindow
SetScrollPos
GetScrollInfo
IsWindow
EnableWindow
GetFocus
CharLowerBuffW
TrackPopupMenuEx
GetGuiResources
EnumWindowStationsW
GetClassLongW
IsHungAppWindow
InternalGetWindowText
IsWindowVisible
GetWindow
SetMenuDefaultItem
EnumWindows
CloseDesktop
SetThreadDesktop
OpenDesktopW
EnumDesktopsW
CreateWindowExA
CloseWindowStation
SetProcessWindowStation
GetProcessWindowStation
OpenWindowStationW
CascadeWindows
TileWindows
SwitchToThisWindow
GetLastActivePopup
EndTask
PostMessageW
LoadCursorA
ShowWindowAsync
GetCursorPos
SetDlgItemTextW
GetParent
GetWindowTextLengthW
GetCursor
SetRect
SetCursor
LoadCursorW
GetWindowRect
DeferWindowPos
EndDeferWindowPos
GetMenuItemInfoW
IsIconic
BeginPaint
EndPaint
DrawEdge
GetForegroundWindow
GetKeyState
GetClipboardOwner
PostThreadMessageW
wsprintfW
GetCaretBlinkTime
GetClientRect
SetScrollInfo
GetDoubleClickTime
ShowWindow
SetWindowPos
SetMenu
GetDlgItem
MapWindowPoints
SendMessageW
GetMenu
CheckMenuRadioItem
CheckMenuItem
DeleteMenu
UnregisterClassA
LoadStringW
SetWindowTextW
GetClassInfoW
RegisterClassW
GetDC
ReleaseDC
SystemParametersInfoW
GetWindowLongW
SetWindowLongW
CallWindowProcW
DefWindowProcW
RemoveMenu
GetWindowLongA
ntdll
_chkstk
NtQueryObject
_snwprintf
RtlUnwind
NtQueryMultipleValueKey
_wcsicmp
NtQueryVirtualMemory
NtGetPlugPlayEvent
NtOpenThread
NtClose
strrchr
NtFlushBuffersFile
NtRemoveIoCompletion
RtlLargeIntegerToChar
RtlAnsiStringToUnicodeString
mbstowcs
memmove
NtQuerySystemInformation
wcstol
NtDeleteKey
NtShutdownSystem
NtInitiatePowerAction
NtPowerInformation
RtlTimeToElapsedTimeFields
iphlpapi
GetInterfaceInfo
GetNumberOfInterfaces
GetIfEntry
comctl32
ImageList_Remove
ImageList_ReplaceIcon
ImageList_SetIconSize
ImageList_Create
CreateStatusWindowW
shell32
Shell_NotifyIconW
ShellAboutW
secur32
GetUserNameExW
vdmdbg
VDMEnumTaskWOWEx
VDMTerminateTaskWOW
Sections
.text Size: 76KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 246KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 67KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ