Static task
static1
Behavioral task
behavioral1
Sample
8997ad8a9c1c9938a8a28c943dbd1cb52733b22c081866a48fae4ada7a340105.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
8997ad8a9c1c9938a8a28c943dbd1cb52733b22c081866a48fae4ada7a340105.exe
Resource
win10v2004-20220812-en
General
-
Target
8997ad8a9c1c9938a8a28c943dbd1cb52733b22c081866a48fae4ada7a340105
-
Size
820KB
-
MD5
3dd3fa86853f039d120c906b32c4d720
-
SHA1
dc67125dcc751fd3ad9a9127ce2bdcadc5a3cf0c
-
SHA256
8997ad8a9c1c9938a8a28c943dbd1cb52733b22c081866a48fae4ada7a340105
-
SHA512
b3c4f128f9191502c7897828fafda4884673349036813325f524eb4a16560329e09f674d126f65188661c2db6799a0a50a9193d7e619f6acaafa1baeca46b66b
-
SSDEEP
12288:ZIcHwf9XkbyifvJ4Uzqo1ZPMlWdBEPZZjchmpBxEtoATxlZN1WKn2sR:acUke8/XUlcw9TbE9TN3WKX
Malware Config
Signatures
Files
-
8997ad8a9c1c9938a8a28c943dbd1cb52733b22c081866a48fae4ada7a340105.exe windows x86
7c4097756afb62489186e4938a66e33c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
QueryPerformanceCounter
SetEnvironmentVariableA
CreateFileA
GetEnvironmentStrings
CompareStringA
FlushFileBuffers
RtlUnwind
GetSystemInfo
VirtualAlloc
GetConsoleMode
InterlockedExchange
HeapAlloc
GlobalFlags
LocalAlloc
FindClose
HeapSize
GetVersionExA
IsDebuggerPresent
LoadResource
GetCurrentThreadId
ReadFile
GlobalAlloc
Sleep
GetModuleFileNameA
lstrlenA
TlsFree
VirtualProtect
GetCommandLineA
GlobalHandle
GetStartupInfoA
GetWindowsDirectoryA
SetStdHandle
TlsSetValue
GetCurrentThread
LockFile
GetFileSize
LocalFree
GetSystemTimeAsFileTime
GetFileTime
GetCommandLineW
VirtualFree
GlobalLock
GetACP
GetThreadLocale
CloseHandle
LockResource
lstrcmpA
SetHandleCount
GetFileType
SizeofResource
DeleteCriticalSection
HeapFree
SetLastError
MulDiv
GetConsoleCP
LocalReAlloc
HeapCreate
GetLastError
TlsAlloc
SetFilePointer
FreeResource
FileTimeToSystemTime
GetStringTypeA
GetProcessHeap
GetLocaleInfoA
LeaveCriticalSection
WriteFile
FileTimeToLocalFileTime
LocalFileTimeToFileTime
SetErrorMode
ExitProcess
RaiseException
FreeEnvironmentStringsA
InterlockedDecrement
HeapReAlloc
EnterCriticalSection
VirtualQuery
GlobalUnlock
InterlockedIncrement
DuplicateHandle
GetStdHandle
GetTimeZoneInformation
TlsGetValue
SetFileTime
GlobalDeleteAtom
UnlockFile
InitializeCriticalSection
UnhandledExceptionFilter
TerminateProcess
FreeLibrary
ConvertDefaultLocale
LCMapStringA
HeapDestroy
GlobalFree
SetEndOfFile
GlobalReAlloc
GetConsoleOutputCP
SetUnhandledExceptionFilter
EnumResourceLanguagesW
GetSystemDirectoryA
SystemTimeToFileTime
GetCurrentProcessId
GetModuleHandleA
GetOEMCP
FindAtomA
AddAtomA
WriteConsoleA
LoadLibraryA
GetProcAddress
FreeConsole
ReadConsoleInputA
GetVersion
GetTickCount
user32
GetLastActivePopup
GetMenu
WindowFromPoint
BeginPaint
SetScrollInfo
LockWindowUpdate
SetScrollRange
SystemParametersInfoA
SetCapture
DeferWindowPos
IsIconic
GetMessageTime
GetWindowPlacement
IsWindowVisible
GetDlgItem
SetActiveWindow
GetDCEx
GetSysColor
AdjustWindowRectEx
PostQuitMessage
ReleaseCapture
InvalidateRect
GetWindowDC
GetKeyState
BringWindowToTop
UnpackDDElParam
UnhookWindowsHookEx
GetMenuItemCount
EndDeferWindowPos
EnableMenuItem
IntersectRect
KillTimer
GetNextDlgTabItem
ShowScrollBar
GetMenuState
GetSystemMetrics
ReleaseDC
ClientToScreen
SetRect
MapWindowPoints
CopyRect
SetFocus
GetCursorPos
ValidateRect
ReuseDDElParam
GetDC
EndPaint
MapDialogRect
DrawIcon
SetMenu
IsWindow
SetWindowContextHelpId
SetTimer
ShowWindow
SetRectEmpty
IsZoomed
PtInRect
GetScrollInfo
GetMessagePos
SetParent
IsWindowEnabled
OffsetRect
GetWindowRect
TrackPopupMenu
InvalidateRgn
SetWindowRgn
SetWindowPos
GetWindowRgn
GetScrollPos
DeleteMenu
GetFocus
UpdateWindow
InflateRect
GetCapture
SetScrollPos
DestroyMenu
IsChild
SetCursor
MessageBeep
GetMenuCheckMarkDimensions
MoveWindow
UnregisterClassA
SetMenuItemBitmaps
GetClientRect
GetSubMenu
GetWindowThreadProcessId
CheckMenuItem
IsRectEmpty
GetParent
BeginDeferWindowPos
GetDlgCtrlID
SetForegroundWindow
ScreenToClient
TranslateMessage
DestroyIcon
EqualRect
GetNextDlgGroupItem
SendDlgItemMessageA
CreatePopupMenu
ScrollWindow
GetScrollRange
GetDesktopWindow
GetTopWindow
DestroyWindow
GetForegroundWindow
FillRect
GetWindow
CallNextHookEx
ShowOwnedPopups
GetMenuItemID
GetSysColorBrush
GetActiveWindow
RedrawWindow
EndDialog
GetSystemMenu
gdi32
GetMapMode
CreateSolidBrush
GetRgnBox
BitBlt
ExcludeClipRect
CreateBitmap
OffsetRgn
IntersectClipRect
GetWindowExtEx
GetDeviceCaps
SetViewportExtEx
CreatePatternBrush
CreateRectRgn
SelectObject
Ellipse
DeleteObject
SetRectRgn
ExtSelectClipRgn
DeleteDC
StretchDIBits
SetTextColor
SaveDC
CreateCompatibleDC
PatBlt
SelectClipRgn
GetPixel
OffsetViewportOrgEx
CombineRgn
CreateEllipticRgn
SetMapMode
CreateCompatibleBitmap
SetBkMode
GetStockObject
GetTextColor
ScaleViewportExtEx
SetWindowExtEx
PtVisible
RestoreDC
GetClipBox
RectVisible
SetViewportOrgEx
CreateRectRgnIndirect
GetBkColor
SetBkColor
DPtoLP
Escape
ScaleWindowExtEx
advapi32
SetFileSecurityW
RegCloseKey
shell32
DragAcceptFiles
DragFinish
ole32
CoRegisterMessageFilter
CreateStreamOnHGlobal
CreateILockBytesOnHGlobal
CoCreateInstance
OleInitialize
CLSIDFromString
StgCreateDocfileOnILockBytes
CoRevokeClassObject
CoFreeUnusedLibraries
OleUninitialize
CLSIDFromProgID
StgOpenStorageOnILockBytes
OleFlushClipboard
CoGetClassObject
CoTaskMemAlloc
CoTaskMemFree
OleIsCurrentClipboard
oleaut32
VariantChangeType
OleCreateFontIndirect
OleLoadPicture
SafeArrayDestroy
SysAllocString
VariantInit
VariantCopy
VariantClear
SystemTimeToVariantTime
VariantTimeToSystemTime
SysAllocStringLen
SysStringLen
SysFreeString
comctl32
ImageList_LoadImageW
shlwapi
PathStripToRootW
PathIsUNCW
PathFindFileNameW
PathRemoveExtensionW
PathFindExtensionW
PathFileExistsW
wldap32
ord201
Sections
.text Size: 640KB - Virtual size: 639KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 153KB - Virtual size: 5.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 101B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ