Static task
static1
Behavioral task
behavioral1
Sample
adbff8e15845a91af27bd207e9f5ba24b537b4e639e16367f1a3267aa6a82935.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
adbff8e15845a91af27bd207e9f5ba24b537b4e639e16367f1a3267aa6a82935.exe
Resource
win10v2004-20220812-en
General
-
Target
adbff8e15845a91af27bd207e9f5ba24b537b4e639e16367f1a3267aa6a82935
-
Size
180KB
-
MD5
c270461a4d5c3fe1bc5d7c323a9e9be7
-
SHA1
94a373197993fe70cb4c938800c474e5e9e7bd15
-
SHA256
adbff8e15845a91af27bd207e9f5ba24b537b4e639e16367f1a3267aa6a82935
-
SHA512
6f6cefd52ff88f20f632da7f2a4d682d3f0b4f4c9317590c0d84a5e41ccd69f2d30e20b4f61717a4839024f5334b93d1744c1c22369fa43f07c5f6fe1d0afecf
-
SSDEEP
1536:A4CU+8uOZdegVb+sUmgj7lnb+oXMfGfHan89lG:AxU+8/ZFisUhjxn2fGf6D
Malware Config
Signatures
Files
-
adbff8e15845a91af27bd207e9f5ba24b537b4e639e16367f1a3267aa6a82935.exe windows x86
e71b95bf4c1d587ebe5aa7be482e7552
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStdHandle
SetEvent
ExpandEnvironmentStringsW
lstrcmpiW
HeapReAlloc
CloseHandle
GetOEMCP
GetCurrentThreadId
VirtualAlloc
FindResourceA
LoadLibraryW
LocalAlloc
IsValidCodePage
GetCurrentProcess
ExitProcess
HeapAlloc
CreateEventW
GetDriveTypeA
RaiseException
GetVersion
LCMapStringW
IsDebuggerPresent
GetModuleHandleA
DeviceIoControl
GetThreadLocale
msvcrt
wcsncpy
_purecall
_controlfp
wcsncmp
_ftol
fprintf
strtoul
__p__iob
_rotl
ctime
_wcslwr
srand
rand
_ultoa
__set_app_type
malloc
_finite
fclose
_snwprintf
_rotr
_wcsnicmp
__initenv
_stat
_CIpow
_lock
_local_unwind2
printf
atoi
_wfopen
swprintf
_ltoa
strchr
__p__fmode
sscanf
wcsrchr
qsort
__p__osver
user32
GetDlgCtrlID
CharNextA
IsChild
SendMessageW
OffsetRect
GetMenu
DefWindowProcW
GetDC
GetClassNameW
GetMessageW
GetWindowRect
IsDlgButtonChecked
IntersectRect
GetWindowLongW
GetMenuItemCount
FindWindowW
BeginPaint
GetCapture
SetWindowLongA
RegisterClassExW
MoveWindow
EnableWindow
GetSysColorBrush
GetWindowTextW
SystemParametersInfoW
ScreenToClient
SetDlgItemTextW
GetActiveWindow
GetDlgItem
GetProcessWindowStation
CreateWindowExW
GetClassNameA
SetCursor
ole32
GetHGlobalFromStream
OleRun
CoReleaseMarshalData
CreateOleAdviseHolder
CLSIDFromString
CoInitializeSecurity
CoDisconnectObject
CoFreeUnusedLibraries
CoGetObjectContext
CreateBindCtx
CoInitializeEx
OleRegGetUserType
CoTaskMemRealloc
CoSetProxyBlanket
CoRevertToSelf
CoRevokeClassObject
CoCreateInstance
CoInitialize
OleCreateStaticFromData
CoGetClassObject
OleSaveToStream
PropVariantCopy
CreateStreamOnHGlobal
StgOpenStorage
PropVariantClear
CoImpersonateClient
CreateDataAdviseHolder
CoRegisterClassObject
CreateILockBytesOnHGlobal
OleUninitialize
CoTaskMemFree
comdlg32
GetOpenFileNameW
GetFileTitleW
GetFileTitleA
GetSaveFileNameW
PrintDlgA
ChooseColorA
GetOpenFileNameA
PageSetupDlgA
ChooseFontW
PrintDlgExW
FindTextW
ChooseFontA
GetSaveFileNameA
ChooseColorW
CommDlgExtendedError
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 71KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 68KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE