Static task
static1
Behavioral task
behavioral1
Sample
ad7547934185e49ad4a4a0ba5d92167ea2f2ed41d16ff69fb29f42e05cf3caab.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ad7547934185e49ad4a4a0ba5d92167ea2f2ed41d16ff69fb29f42e05cf3caab.exe
Resource
win10v2004-20220812-en
General
-
Target
ad7547934185e49ad4a4a0ba5d92167ea2f2ed41d16ff69fb29f42e05cf3caab
-
Size
289KB
-
MD5
bf14ce3d74c594334d6113b3ff091c7c
-
SHA1
acd2350bf5780abec51d382eb8478191b1e4bfc2
-
SHA256
ad7547934185e49ad4a4a0ba5d92167ea2f2ed41d16ff69fb29f42e05cf3caab
-
SHA512
97189f4f2273946aa015862da2558004eab95f0b3b4cd21aa9a44b6e97588ba785b8c1d831e8a2340dbb6af8b6b33cf84caed80e06875693009b55908e5a102a
-
SSDEEP
6144:f4JGyj4RIsGPqH+gwWGJVATjtZXEPYBZYNGrH3HNB5/2jE+BMfTFrq:f4syb3qH+gwFStZXWksGLHNbeBOc
Malware Config
Signatures
Files
-
ad7547934185e49ad4a4a0ba5d92167ea2f2ed41d16ff69fb29f42e05cf3caab.exe windows x86
e08e9f1434c57c9e793c3a0633592c5b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalUnlock
GetCurrentDirectoryA
GetUserDefaultUILanguage
SystemTimeToFileTime
GetCurrentThread
GetProfileStringW
DeleteTimerQueueTimer
Sleep
SetFileAttributesA
SetUnhandledExceptionFilter
MoveFileExA
IsValidLocale
SetEvent
GetCommandLineW
GlobalSize
lstrlenA
GetModuleHandleA
MapViewOfFile
FindClose
lstrcpynA
GetCommandLineA
InterlockedExchange
WaitForMultipleObjects
TlsFree
FileTimeToSystemTime
AddAtomA
GetSystemDirectoryW
LoadLibraryW
OutputDebugStringW
EnumResourceLanguagesW
VerifyVersionInfoW
GetVersionExW
IsBadReadPtr
GetComputerNameA
GetTimeFormatA
CopyFileW
GetStringTypeW
GlobalFindAtomW
QueryPerformanceFrequency
MulDiv
GetWindowsDirectoryW
FindNextChangeNotification
SetLastError
CreateMutexA
LoadResource
CreateProcessW
SetEnvironmentVariableA
FormatMessageA
GetCurrentProcess
TerminateProcess
VirtualFree
DebugBreak
GetVersion
HeapReAlloc
GetStringTypeExA
GetModuleHandleW
SetThreadPriority
QueryDosDeviceA
GetTempPathA
SystemTimeToTzSpecificLocalTime
GetShortPathNameW
OpenMutexW
Process32NextW
VirtualAlloc
InterlockedIncrement
InterlockedDecrement
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
LoadLibraryA
GetProcAddress
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
WriteFile
RtlUnwind
HeapFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetLastError
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
ExitProcess
GetStartupInfoA
oleaut32
VariantClear
gdi32
RestoreDC
SetBkColor
LineDDA
SelectPalette
user32
GetDlgItemTextA
GetDlgItemTextW
wsprintfW
GetMenuItemInfoW
MonitorFromWindow
SetWindowTextW
SetWindowsHookExW
EndDialog
GetAsyncKeyState
SetCursor
SetMenuDefaultItem
ShowScrollBar
EnableWindow
SetClipboardData
UnionRect
CharToOemBuffA
CreateAcceleratorTableW
GetClipboardFormatNameA
IsCharAlphaA
GetAncestor
PostMessageA
DdeCreateStringHandleW
RemovePropW
DrawFocusRect
GetMessageA
FindWindowExW
DrawIcon
RemovePropA
SubtractRect
HideCaret
TranslateAcceleratorW
DefMDIChildProcA
DdeFreeDataHandle
CopyAcceleratorTableA
LockWindowUpdate
SendDlgItemMessageW
CallWindowProcW
EndDeferWindowPos
SetScrollInfo
VkKeyScanW
UpdateWindow
IsChild
InSendMessage
SetTimer
DrawStateW
CopyRect
RegisterClipboardFormatW
DdeUninitialize
DdeUnaccessData
GetCursorPos
SendMessageTimeoutW
InsertMenuItemW
GetClassInfoExW
SetFocus
WindowFromDC
EmptyClipboard
ModifyMenuW
VkKeyScanA
ShowCursor
SetWindowsHookExA
SetMenuItemInfoW
BroadcastSystemMessageA
WindowFromPoint
GetMenu
UnregisterDeviceNotification
LoadIconA
LoadStringA
GetUserObjectInformationW
DestroyAcceleratorTable
OemToCharBuffA
CreateDialogIndirectParamW
TranslateAcceleratorA
ShowCaret
GetCaretBlinkTime
IsIconic
DdeAccessData
IsCharAlphaW
IsMenu
IsZoomed
DestroyIcon
RegisterWindowMessageA
Sections
.text Size: 247KB - Virtual size: 246KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
wcqmiu Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
sgcymu Size: 16KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kwiwc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE