Static task
static1
Behavioral task
behavioral1
Sample
ac9d64861ae1c479af9f00e0a823f21e04724e5e24d3508008a3deca1b0fe942.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ac9d64861ae1c479af9f00e0a823f21e04724e5e24d3508008a3deca1b0fe942.exe
Resource
win10v2004-20221111-en
General
-
Target
ac9d64861ae1c479af9f00e0a823f21e04724e5e24d3508008a3deca1b0fe942
-
Size
204KB
-
MD5
7ee79f6db45a839568f32b16421a1d62
-
SHA1
a1c3dcaa1d90c794374bbcf7786d3654080a7db2
-
SHA256
ac9d64861ae1c479af9f00e0a823f21e04724e5e24d3508008a3deca1b0fe942
-
SHA512
77760818325d3457acb6b94e298ebd2fd2c5ebe69086796880f213eea5630b48408eea5333a344043593bccf3a876f8b2dcdfb013a9746ea2f098627915d2d23
-
SSDEEP
3072:fQ5fRfKyWa3FGs3Cm1f9gC7PDzhpJksjVvOgSm5nx9tYY//0ja7J/Rto:fSfKUb3RF62z/J5vZ5J/AaO
Malware Config
Signatures
Files
-
ac9d64861ae1c479af9f00e0a823f21e04724e5e24d3508008a3deca1b0fe942.exe windows x86
d30d486598c2d86c4293fccf2d985f88
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
FileTimeToSystemTime
FileTimeToLocalFileTime
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
GlobalFlags
GetCPInfo
GetOEMCP
RtlUnwind
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapAlloc
HeapFree
RaiseException
GetACP
GetTimeZoneInformation
lstrcatA
HeapReAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
LCMapStringA
LCMapStringW
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetFileTime
GetFileSize
GetFileAttributesA
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalAlloc
GlobalReAlloc
GlobalLock
GlobalHandle
GlobalUnlock
GlobalFree
TlsAlloc
LocalAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetVersion
InitializeCriticalSection
lstrcmpA
LocalFree
lstrcmpiA
GetFullPathNameA
GetVolumeInformationA
GetModuleFileNameA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
lstrcpynA
SetLastError
lstrlenA
InterlockedDecrement
InterlockedIncrement
GetVersionExA
lstrcpyA
TerminateProcess
Sleep
GetModuleHandleA
FreeLibrary
CallNamedPipeA
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
CreateEventA
WaitForSingleObject
GetCurrentProcessId
SetEvent
CreateMutexA
GetLastError
ReleaseMutex
LoadLibraryA
GetProcAddress
OpenProcess
CloseHandle
MultiByteToWideChar
WideCharToMultiByte
HeapSize
user32
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
SetWindowTextA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
GetTopWindow
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
DispatchMessageA
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
wsprintfA
GetCapture
SendMessageA
MessageBoxA
EnableWindow
LoadStringA
UnhookWindowsHookEx
GetSystemMetrics
CharUpperA
GetWindowRect
gdi32
RestoreDC
SelectObject
GetStockObject
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SaveDC
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
DeleteDC
DeleteObject
GetDeviceCaps
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
comctl32
ord17
Sections
.text Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
�&� Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE