Static task
static1
Behavioral task
behavioral1
Sample
a8285c354e58efaa188d186659b05a46db36eacc05f3fb1f79df1c17b5d838b6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a8285c354e58efaa188d186659b05a46db36eacc05f3fb1f79df1c17b5d838b6.exe
Resource
win10v2004-20220812-en
General
-
Target
a8285c354e58efaa188d186659b05a46db36eacc05f3fb1f79df1c17b5d838b6
-
Size
202KB
-
MD5
c63ecc4eba54a6ad97d98d8d211a3f3d
-
SHA1
578363cff4705b611cd8917c78353ee6b8775aef
-
SHA256
a8285c354e58efaa188d186659b05a46db36eacc05f3fb1f79df1c17b5d838b6
-
SHA512
3dd3e82804c248cb38d80b831d4bec6cbb542dac50e1d575489beef45fb700f0846e3b232dc5297ecf7f98002a7603a7a04d2b65eb9d4aa7784c27aa1c9c7b87
-
SSDEEP
3072:gPDzv9vQji/EqxWQGttgECDgzpeFcJSY8oweRcgX2cmy563NfwCi9zo7B0Zqo6O1:gbzvK+EqxOvgQLw1CmpwGWvb
Malware Config
Signatures
Files
-
a8285c354e58efaa188d186659b05a46db36eacc05f3fb1f79df1c17b5d838b6.exe windows x86
a8dd95a26698fde3cae740d4ba73b1e8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetFileTitleA
PrintDlgA
user32
EmptyClipboard
GetSysColorBrush
GetWindowRect
SetMenuItemInfoW
MessageBeep
DefWindowProcA
SendMessageW
GetWindowPlacement
EndPaint
ShowWindow
EnableScrollBar
BeginPaint
LoadBitmapW
GetMessageW
CreateWindowExW
GetClassNameW
DeleteMenu
ReleaseCapture
SetMenuItemBitmaps
GetWindowThreadProcessId
SetFocus
UpdateWindow
GetDC
GetSysColor
CopyRect
RemoveMenu
GetClientRect
SetMenu
LoadIconW
PostMessageW
GetWindowTextW
SystemParametersInfoW
OpenClipboard
SendDlgItemMessageW
SetCursorPos
EndDeferWindowPos
SetRectEmpty
ChildWindowFromPoint
AppendMenuW
WindowFromPoint
DefMDIChildProcW
GetAsyncKeyState
UnregisterClassW
GetSystemMetrics
RegisterClassW
IsZoomed
MoveWindow
GetDesktopWindow
SubtractRect
LoadCursorW
MessageBoxW
EqualRect
IsWindow
InvalidateRect
RegisterClassExW
CheckMenuItem
IsIconic
TranslateMDISysAccel
DeferWindowPos
PtInRect
GetSystemMenu
GetSubMenu
SetTimer
DestroyMenu
SetClipboardData
SetWindowTextW
LoadImageW
SetParent
CreatePopupMenu
SetActiveWindow
GetWindowTextLengthW
GetClipboardData
GetMenuDefaultItem
GetWindowLongW
PostQuitMessage
IsClipboardFormatAvailable
SetScrollInfo
ReleaseDC
RegisterClipboardFormatW
GetActiveWindow
SetCapture
GetWindow
BeginDeferWindowPos
GetLastActivePopup
UnionRect
SetDlgItemInt
InflateRect
PeekMessageW
GetDlgItemInt
CallWindowProcW
LoadMenuW
SetCursor
TranslateMessage
IsMenu
DrawFocusRect
FillRect
CloseClipboard
SetWindowPos
GetWindowDC
GetMenuState
DestroyWindow
ModifyMenuW
EnableMenuItem
GetMenu
UnhookWindowsHookEx
BringWindowToTop
EndDialog
SetRect
GetForegroundWindow
GetParent
GetDCEx
GetWindowRgn
SetMenuDefaultItem
GetCursorPos
DestroyIcon
GetMessagePos
SetForegroundWindow
DefWindowProcW
DestroyCursor
ole32
OleQueryCreateFromData
SetConvertStg
CreateILockBytesOnHGlobal
CoGetMalloc
OleSetContainedObject
WriteFmtUserTypeStg
ReadFmtUserTypeStg
WriteClassStg
OleCreateFromData
CoTreatAsClass
CLSIDFromString
OleSaveToStream
ReadClassStg
OleIsRunning
StgCreateDocfileOnILockBytes
OleQueryLinkFromData
GetRunningObjectTable
OleInitialize
CoCreateInstance
kernel32
HeapAlloc
LocalFileTimeToFileTime
GetFileTime
GetProcessHeap
lstrlenA
GetModuleHandleA
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GlobalLock
GetProcAddress
UnhandledExceptionFilter
TlsSetValue
GlobalAlloc
CloseHandle
HeapReAlloc
ReadFile
MapViewOfFile
FlushInstructionCache
DeleteCriticalSection
HeapDestroy
GetCurrentThread
FindNextFileW
EnterCriticalSection
GetCommandLineA
InitializeCriticalSection
VirtualFree
GetCurrentProcess
FileTimeToLocalFileTime
GlobalFree
WideCharToMultiByte
MulDiv
GetLocaleInfoW
FindClose
RaiseException
LeaveCriticalSection
GetCommandLineW
GetStringTypeW
GetFileAttributesA
GetEnvironmentVariableW
CreateFileW
lstrcpyW
GetThreadLocale
HeapCreate
SetStdHandle
GetModuleFileNameA
GetACP
CreateDirectoryA
DuplicateHandle
InterlockedExchange
CompareStringW
GetSystemTime
CompareStringA
SetHandleCount
RtlUnwind
GetCurrentProcessId
GetModuleHandleW
LCMapStringW
TlsFree
GetCPInfo
GetTickCount
ExitProcess
WriteFile
InterlockedDecrement
TlsAlloc
SetEnvironmentVariableA
IsBadWritePtr
FlushFileBuffers
SuspendThread
LCMapStringA
GetLocaleInfoA
GetFileType
LockResource
VirtualProtect
LoadLibraryA
GetCurrentThreadId
MultiByteToWideChar
GetEnvironmentStringsW
GetVersion
Sleep
GetTimeZoneInformation
HeapFree
TerminateProcess
GetLastError
GetStringTypeA
GetStdHandle
GetStartupInfoA
FatalAppExitA
GetLocalTime
GetDateFormatA
GetModuleFileNameW
CreateMutexW
GetVersionExA
FindNextFileA
QueryPerformanceCounter
lstrcmpW
GetStartupInfoW
CreateMutexA
SetLastError
ExitThread
HeapSize
SizeofResource
IsDebuggerPresent
GetEnvironmentStrings
SetFilePointer
lstrcpynA
SetUnhandledExceptionFilter
FreeEnvironmentStringsW
IsValidLocale
GetFullPathNameW
VirtualQuery
InterlockedIncrement
FileTimeToSystemTime
VirtualAlloc
TlsGetValue
advapi32
RegDeleteKeyA
SetSecurityDescriptorDacl
RegOpenKeyExA
RegSetValueA
RegCloseKey
RegQueryValueExA
comctl32
ImageList_GetImageInfo
ImageList_Remove
CreatePropertySheetPageA
DestroyPropertySheetPage
ImageList_GetIconSize
ImageList_Replace
ImageList_ReplaceIcon
ImageList_GetIcon
ImageList_LoadImageA
ImageList_AddMasked
_TrackMouseEvent
ImageList_Destroy
ImageList_Create
ImageList_Add
ImageList_GetImageCount
ImageList_DragEnter
ImageList_Draw
ord17
InitCommonControlsEx
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 49KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ