Static task
static1
Behavioral task
behavioral1
Sample
af54431fae38b0f99d6af42a41f1a355042323a0285d27f6b327fa6f1718cfa9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
af54431fae38b0f99d6af42a41f1a355042323a0285d27f6b327fa6f1718cfa9.exe
Resource
win10v2004-20220812-en
General
-
Target
af54431fae38b0f99d6af42a41f1a355042323a0285d27f6b327fa6f1718cfa9
-
Size
100KB
-
MD5
87175056e32b3785bde0787a530b21db
-
SHA1
1c69406313979771c714bda2eaec2f2ca8ad3a9d
-
SHA256
af54431fae38b0f99d6af42a41f1a355042323a0285d27f6b327fa6f1718cfa9
-
SHA512
7490385f8a6cd07a90a1a44c3578a69c3d5d1c07ce9c837c24fc931d0ca00163532ed9f2c3dc2398d9860f0b09e62329c1c419b27f19fba10c13ab835efe27db
-
SSDEEP
3072:sG5Hl1Cr3bSsHEIxLzkk3greqzSbXm8jbxDhh81:p5F1Cr3bSsHEIxL5g1eLmIdf8
Malware Config
Signatures
Files
-
af54431fae38b0f99d6af42a41f1a355042323a0285d27f6b327fa6f1718cfa9.exe windows x86
dbeea143f4240033f3f5daf3fd5ee125
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHBrowseForFolderA
DragQueryFileW
SHGetDesktopFolder
CommandLineToArgvW
SHGetSpecialFolderLocation
SHChangeNotify
DragQueryFileA
ole32
ReleaseStgMedium
CoSetProxyBlanket
CoRevokeClassObject
GetHGlobalFromStream
CoRevertToSelf
StgCreateDocfile
StgOpenStorage
GetRunningObjectTable
CLSIDFromString
CoCreateInstance
CoCreateFreeThreadedMarshaler
CoMarshalInterThreadInterfaceInStream
CoGetClassObject
CoInitialize
CreateStreamOnHGlobal
CoInitializeSecurity
CreateBindCtx
StringFromCLSID
OleUninitialize
CoCreateGuid
CoInitializeEx
CoImpersonateClient
StringFromGUID2
CoGetInterfaceAndReleaseStream
CreateOleAdviseHolder
CoFreeUnusedLibraries
CoGetContextToken
CreateDataAdviseHolder
CoTaskMemAlloc
CLSIDFromProgID
IIDFromString
CoGetObjectContext
StgCreateDocfileOnILockBytes
msvcrt
sprintf
_ftol
__setusermatherr
strncmp
__p__commode
iswctype
_itoa
memcpy
wcstoul
setlocale
time
wcsrchr
fread
_controlfp
strstr
??1type_info@@UAE@XZ
__wgetmainargs
printf
strchr
_CxxThrowException
wcscat
__p__fmode
??2@YAPAXI@Z
__set_app_type
__dllonexit
_wcsnicmp
_wcsupr
isxdigit
_initterm
wcstol
oleaut32
SysReAllocStringLen
SafeArrayGetLBound
OleLoadPicture
GetActiveObject
VariantCopyInd
SafeArrayCreate
SafeArrayAccessData
VariantChangeTypeEx
SysStringLen
SafeArrayPutElement
CreateErrorInfo
VariantClear
SysAllocStringByteLen
SysStringByteLen
SafeArrayGetElement
VariantInit
SafeArrayPtrOfIndex
VariantCopy
LoadTypeLib
SafeArrayGetUBound
SysFreeString
GetErrorInfo
RegisterTypeLib
VariantChangeType
rpcrt4
NdrClientCall2
RpcBindingFree
CStdStubBuffer_Disconnect
NdrDllRegisterProxy
CStdStubBuffer_DebugServerQueryInterface
NdrCStdStubBuffer2_Release
NdrDllUnregisterProxy
RpcEpResolveBinding
CStdStubBuffer_AddRef
UuidToStringA
RpcBindingSetAuthInfoW
CStdStubBuffer_Invoke
NdrServerCall2
RpcServerUseProtseqEpW
RpcStringFreeW
NdrStubForwardingFunction
UuidCreate
CStdStubBuffer_IsIIDSupported
RpcStringBindingComposeW
NdrStubCall2
RpcRaiseException
UuidFromStringW
NdrDllGetClassObject
IUnknown_QueryInterface_Proxy
IUnknown_Release_Proxy
CStdStubBuffer_QueryInterface
RpcStringFreeA
NdrOleAllocate
NdrCStdStubBuffer_Release
RpcBindingToStringBindingW
RpcBindingFromStringBindingW
UuidToStringW
user32
GetActiveWindow
GetSysColor
LoadIconA
CharNextA
InvalidateRect
IsWindow
LoadImageW
ReleaseDC
GetMenu
GetSysColorBrush
ChangeMenuW
GetWindowPlacement
GetWindowDC
EnableWindow
GetSystemMenu
GetSystemMetrics
UnhookWindowsHookEx
GetWindow
RedrawWindow
ReleaseCapture
MsgWaitForMultipleObjects
BeginPaint
GetMessageA
IsChild
CheckMenuItem
CreateWindowExW
GetCursorPos
GetWindowTextA
GetSubMenu
GetDlgItemTextA
RegisterClassExA
kernel32
GetThreadLocale
GetLocaleInfoW
GetCPInfo
GetCommandLineW
VirtualAlloc
ExitProcess
CreateFileMappingA
GetProcessHeap
DeviceIoControl
ResetEvent
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
lstrcatA
IsBadReadPtr
GetFullPathNameW
GetCommandLineA
LoadLibraryA
GetSystemDirectoryW
SetEvent
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
LocalAlloc
GetConsoleMode
CloseHandle
GetACP
WriteConsoleW
lstrcpynW
OutputDebugStringW
GetCurrentThread
GetOEMCP
GetCurrentProcessId
GetModuleHandleW
GetUserDefaultLCID
TerminateProcess
FindNextFileA
GetStdHandle
CreateMutexW
SetStdHandle
Sleep
GetVersionExW
TlsAlloc
Sections
.text Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 47KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 483B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ