Static task
static1
Behavioral task
behavioral1
Sample
a9276c376b3b5a3d9c1d544153f2a8699762d67001affc4b685a417d0940cb50.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a9276c376b3b5a3d9c1d544153f2a8699762d67001affc4b685a417d0940cb50.exe
Resource
win10v2004-20220812-en
General
-
Target
a9276c376b3b5a3d9c1d544153f2a8699762d67001affc4b685a417d0940cb50
-
Size
220KB
-
MD5
47077b89e7bf944b5bb05824c503ebf1
-
SHA1
2ac518a2d0784a6bc5ae3090b013742de79860a1
-
SHA256
a9276c376b3b5a3d9c1d544153f2a8699762d67001affc4b685a417d0940cb50
-
SHA512
f9fc0b0e743f587a20f355b4c54bb9402149ca96d944338b980035d7c75cf8221866713cfa36f20e47820c16de5be4e2fef402c41e10217c767c58c3e25bd24a
-
SSDEEP
6144:EtxJLgfR9mvgjGTq4Debjrbl+ToKq4m3BJ9Ax6gY:EwR9mv/Tqiwl+TjPmxfj
Malware Config
Signatures
Files
-
a9276c376b3b5a3d9c1d544153f2a8699762d67001affc4b685a417d0940cb50.exe windows x86
0285ff383c362694f7772a1b633fa528
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpynW
GetThreadTimes
HeapReAlloc
GetProfileIntW
CreateHardLinkW
GetProcessHeap
FreeEnvironmentStringsW
ProcessIdToSessionId
SetVolumeLabelW
SetCommTimeouts
GetSystemPowerStatus
SetTimeZoneInformation
LockFileEx
HeapUnlock
SetErrorMode
PurgeComm
lstrlenA
IsBadStringPtrA
CreateIoCompletionPort
GetThreadPriority
GetComputerNameExW
GetTempPathW
OpenFileMappingA
FindFirstVolumeW
MultiByteToWideChar
FindAtomW
FileTimeToDosDateTime
FindResourceExA
GetLogicalDriveStringsW
FindResourceA
AddAtomA
InitializeCriticalSection
GetProcAddress
LoadLibraryA
ole32
CoInitialize
OleSetMenuDescriptor
CoRevertToSelf
CoTaskMemAlloc
CoFreeUnusedLibraries
CoSetProxyBlanket
CreateGenericComposite
user32
CharUpperBuffW
TabbedTextOutW
GetUserObjectInformationW
GetMenuDefaultItem
CopyAcceleratorTableA
RegisterWindowMessageW
ScreenToClient
GetCursorPos
EnableMenuItem
GetClassInfoW
GetKeyNameTextW
DrawFrameControl
UnhookWindowsHook
GetDlgCtrlID
TrackMouseEvent
CharNextW
GetTopWindow
DialogBoxIndirectParamW
TrackPopupMenuEx
SendNotifyMessageA
GetKeyNameTextA
CharLowerW
CreateDialogParamA
GetDlgItem
MessageBoxA
AdjustWindowRect
CheckDlgButton
CreatePopupMenu
GetWindowDC
GetWindowLongW
CopyRect
CharPrevA
PtInRect
GetFocus
GetCursor
DefDlgProcW
SetTimer
DefDlgProcA
ModifyMenuA
EndTask
IsWindow
oleaut32
SysStringByteLen
SysFreeString
shlwapi
StrRetToStrW
PathIsUNCServerW
PathIsRootW
PathAppendA
PathCreateFromUrlW
wvnsprintfW
UrlCombineW
SHRegSetUSValueW
PathSkipRootW
PathAddBackslashA
StrChrW
StrFormatKBSizeW
advapi32
DuplicateToken
InitiateSystemShutdownW
EnumServicesStatusA
OpenEventLogA
CreateProcessWithLogonW
RegDeleteValueA
RegQueryValueExA
RegisterServiceCtrlHandlerExW
SaferCreateLevel
RegisterServiceCtrlHandlerExA
QueryServiceStatus
shell32
SHGetDesktopFolder
SHBrowseForFolderW
SHGetSettings
ShellExecuteExW
SHGetSpecialFolderPathW
SHGetFolderPathW
SHFileOperationA
SHAddToRecentDocs
gdi32
PlayMetaFileRecord
SetColorAdjustment
GetDIBits
GetStockObject
CreateDIBPatternBrushPt
SetViewportExtEx
CloseFigure
Polyline
CopyEnhMetaFileA
RoundRect
SetMapMode
SetDIBits
CreateDIBSection
EndDoc
CreateCompatibleBitmap
EndPath
GetRgnBox
GetPixelFormat
AnimatePalette
DescribePixelFormat
ExtTextOutW
CreateMetaFileA
SetMetaFileBitsEx
SetTextColor
Sections
.text Size: 160KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE