Static task
static1
Behavioral task
behavioral1
Sample
a9b8ce15194332486558ae423d359a4c5da456d58ead7d825e8f2b605021c4ed.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a9b8ce15194332486558ae423d359a4c5da456d58ead7d825e8f2b605021c4ed.exe
Resource
win10v2004-20221111-en
General
-
Target
a9b8ce15194332486558ae423d359a4c5da456d58ead7d825e8f2b605021c4ed
-
Size
242KB
-
MD5
9159f5d949e261e6171ad17977491ef0
-
SHA1
49558c0711354511e35860de10b43f891ccff865
-
SHA256
a9b8ce15194332486558ae423d359a4c5da456d58ead7d825e8f2b605021c4ed
-
SHA512
e895e750a3791a690233dfdada2bd6167c445c1c279d7c5cce3e145df7cf95d10a0954f57ea720f50f777ff74c463aa78fe41e60ac4e0fbdab5b48e3b84ff389
-
SSDEEP
3072:b6GS7Zuj14k8GuOLJk8o47lz10G/NNH7j6CgZJB5WlpS:bwVuj14kR1LJ/D7lz2G/bH7hlp
Malware Config
Signatures
Files
-
a9b8ce15194332486558ae423d359a4c5da456d58ead7d825e8f2b605021c4ed.exe windows x86
261aeed788763530f876863f98964787
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
lstrcmpA
lstrlenA
lstrcmpW
GlobalFlags
GlobalAddAtomW
GlobalHandle
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
CreateFileW
GlobalDeleteAtom
GetVersionExA
LoadLibraryA
GlobalFindAtomW
GetModuleHandleA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
HeapReAlloc
HeapSize
ExitProcess
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
VirtualAlloc
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
CreateFileA
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
InterlockedDecrement
InterlockedIncrement
GetModuleHandleW
WideCharToMultiByte
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
LocalFree
lstrlenW
GetLocalTime
GetDiskFreeSpaceExW
GetDriveTypeW
GetLogicalDrives
CopyFileW
FindClose
FindNextFileW
FindFirstFileW
LockResource
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
CreateThread
HeapFree
GetProcessHeap
HeapAlloc
CloseHandle
GetCurrentProcess
FreeLibrary
GetProcAddress
LoadLibraryW
WaitForSingleObject
DeleteFileW
CreateMutexW
GetVersionExW
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
Sleep
GetLastError
GetModuleFileNameW
TerminateThread
GetExitCodeThread
GetCurrentThreadId
user32
TabbedTextOutW
DrawTextW
DrawTextExW
GrayStringW
DestroyMenu
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
GetClientRect
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
DefWindowProcW
CallWindowProcW
GetMenu
SystemParametersInfoA
GetWindowPlacement
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
RegisterWindowMessageW
CheckMenuItem
PostQuitMessage
SetForegroundWindow
IsIconic
SetWindowPos
SetWindowLongW
IsWindow
GetDlgItem
SetWindowsHookExW
CallNextHookEx
GetKeyState
ValidateRect
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
SetWindowTextW
GetWindowTextW
GetWindowThreadProcessId
SendMessageW
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
PostThreadMessageW
PeekMessageW
DispatchMessageW
MessageBoxW
UnhookWindowsHookEx
LoadCursorW
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetMenuState
LoadIconW
WinHelpW
OpenWindowStationW
GetProcessWindowStation
SetProcessWindowStation
OpenDesktopW
CloseDesktop
wsprintfW
FindWindowW
PostMessageW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetMenuItemID
GetMenuItemCount
GetSubMenu
EnableMenuItem
advapi32
DeregisterEventSource
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
CreateProcessAsUserW
StartServiceW
ReportEventW
RegisterEventSourceW
DeleteService
ControlService
CreateServiceW
CloseServiceHandle
OpenServiceW
OpenSCManagerW
RegisterServiceCtrlHandlerW
SetServiceStatus
StartServiceCtrlDispatcherW
shell32
ShellExecuteW
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
VariantClear
VariantChangeType
SysFreeString
SysAllocString
VariantInit
shlwapi
PathRemoveFileSpecW
PathFileExistsW
oleacc
LresultFromObject
CreateStdAccessibleObject
gdi32
SetBkColor
SaveDC
RestoreDC
CreateBitmap
DeleteObject
GetStockObject
SetViewportOrgEx
SetTextColor
DeleteDC
SetMapMode
PtVisible
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
GetDeviceCaps
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
OffsetViewportOrgEx
winspool.drv
DocumentPropertiesW
OpenPrinterW
ClosePrinter
Sections
.text Size: 141KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ