Static task
static1
Behavioral task
behavioral1
Sample
a97cfabb95370bdaa2ed548c959d1a5c254ec8ac197223df028465f036cadce2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a97cfabb95370bdaa2ed548c959d1a5c254ec8ac197223df028465f036cadce2.exe
Resource
win10v2004-20220901-en
General
-
Target
a97cfabb95370bdaa2ed548c959d1a5c254ec8ac197223df028465f036cadce2
-
Size
164KB
-
MD5
52b5e253b8487ccce887c312b1f2f141
-
SHA1
ea17c16c6c6f3960c79d61b2aa0d3f0f1813d8bc
-
SHA256
a97cfabb95370bdaa2ed548c959d1a5c254ec8ac197223df028465f036cadce2
-
SHA512
96525bc4987f1cfcbb5e4bebc8662097596e67f3d46baee2b18fc11f249372cecd2a002c649b835784776bc830358490d07b96d75995f764686c811d7969db48
-
SSDEEP
3072:sf0LEDbSNJcsNviT3lX2ywnIVtXSpHlQkT:TIKt6T1G8Xk
Malware Config
Signatures
Files
-
a97cfabb95370bdaa2ed548c959d1a5c254ec8ac197223df028465f036cadce2.exe windows x86
c795bd97c39af59a2e1b9651044ab113
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
FileTimeToSystemTime
FileTimeToLocalFileTime
GetModuleHandleA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetVersion
GetProcessVersion
GlobalFlags
WritePrivateProfileStringA
GetCPInfo
GetOEMCP
RtlUnwind
GetTimeZoneInformation
GetSystemTime
HeapFree
HeapAlloc
ExitProcess
GetStartupInfoA
GetCommandLineA
RaiseException
SetStdHandle
GetFileType
GetACP
GlobalHandle
HeapSize
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GlobalUnlock
GlobalFree
TlsAlloc
lstrcatA
SetErrorMode
GetFileTime
GetFileSize
GetFileAttributesA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
GetCurrentThread
GetCurrentThreadId
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
FreeLibrary
EnterCriticalSection
SetLastError
GetModuleFileNameA
lstrcmpiA
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
lstrcpyA
LoadLibraryA
GetProcAddress
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
DuplicateHandle
InterlockedDecrement
InterlockedIncrement
FormatMessageA
LocalFree
GetCurrentProcess
CopyFileA
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
GetLastError
FindFirstFileA
FindNextFileA
FindClose
TerminateProcess
GetLocalTime
SystemTimeToFileTime
WaitForSingleObject
GetTempFileNameA
Sleep
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
GetCurrentDirectoryA
DeleteFileA
CreateFileA
WriteFile
CloseHandle
HeapReAlloc
SetFileAttributesA
user32
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
LoadIconA
SetWindowTextA
ShowWindow
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
PtInRect
ClientToScreen
TabbedTextOutA
DrawTextA
GrayStringA
DestroyMenu
GetClientRect
CopyRect
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetDlgCtrlID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
UnhookWindowsHookEx
LoadStringA
GetMessageA
TranslateMessage
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
EnableWindow
SetCursor
PostQuitMessage
PostMessageA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
SendMessageA
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetSystemMetrics
CharUpperA
wsprintfA
SetForegroundWindow
GetWindowTextA
GetClassNameA
GetWindow
GetParent
DispatchMessageA
UnregisterClassA
gdi32
RestoreDC
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SaveDC
SetWindowExtEx
ScaleWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
CreateBitmap
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
SelectObject
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegQueryValueExA
shell32
SHGetSpecialFolderPathA
ShellExecuteExA
ShellExecuteA
comctl32
ord17
wininet
InternetReadFile
InternetQueryDataAvailable
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
DeleteUrlCacheEntry
HttpQueryInfoA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetGetLastResponseInfoA
iphlpapi
GetAdaptersInfo
Sections
.text Size: 112KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ